Extrait
Table of Contents
Abstract
Chapter 1 Introduction
1.1 Background
1.2 Project Objectives
1.3 Methods Used
Chapter 2 Causes of Data Breach
Introduction
2.1 Types of data breaches
2.1.1 Well-meaning insider or Benevolent Insider
2.1.2 Malicious Insider
2.1.3 Malicious Outsider or Targeted attacks
2.2 Tools and techniques used by Malicious Outsiders or Hackers
Chapter 3: Laws & Cost of Data Breach
Introduction
3.1 UK Law & Governance
3.1.1 Data Protection Act [16]
3.1.2 Privacy and Electronic Communications Regulations [18]
3.2 Cost of data breaches
Chapter 4: Existing Security Mechanisms
Introduction
4.1 Antimalware, Antispyware & Proactive Protection [27]
4.2 Firewall [28]
4.3 IDS/IPS [29] [30]
4.4 SIEM (Security Information and Event Management) [31]
4.6 Vulnerability Scanning and patching [34]
Summary
Chapter 5: Analyze DLP Solutions to Prevent Data Breaches
Introduction
5.1 How does Data Loss Prevention system Work?
5.2 Approaches by a DLP system to prevent Data Loss [35]
5.3 Types of Data Loss Prevention Systems [36]
5.4 Architecture of Symantec Data Loss Prevention Solution
5.5 DLP Honey Pots to Detect Malicious Insiders [37]
Summary
Future scope for research
Chapter 6: Conclusion & Recommendations
Appendix A: Data Breach Log Template
Appendix B: PECR Security Breach Notification Form
References
Table of Figures
Figure 1 Four phases of a targeted attack [3]
Figure 2 Comparison of 'Types of breaches' from 2004 to 2011 [4]
Figure 3 A Remote Access Tool displaying various options available for a remote hacker
Figure 4 Types of attacks faced by organization in 2011 [13]
Figure 5 Data Breach attacks by type of industry [14]
Figure 6 The average total cost of data breach per record over five years [21]
Figure 7 The average total organisational cost of data breach over five years [26]
Figure 8 A typical Enterprise network with IPS and IDS
Figure 9 An enterprise network with IDS
Figure 10 An enterprise network with IPS
Figure 11 Architecture of RSA's SIEM solution [32]
Figure 12 A Summary of security events and vulnerable assets in RSA enVision [33]
Figure 13 Architecture of a vulnerability scanner
Figure 14 Architecture of Symantec Data Loss Prevention
- Citation du texte
- Vikas Rajole (Auteur), 2012, Causes of Data Breaches and Preventive Measures. Data Loss Prevention, Munich, GRIN Verlag, https://www.grin.com/document/214310
Devenir un auteur
Commentaires