Publié par : pintejp | avril 24, 2015

VERIZON – 2015 Data Breach Investigations

VERIZON – 2015 Data Breach Investigations Report 70 pages

Prepare your enterprise to conduct individualized self-assessments of risk, so you can make realistic decisions on how to avoid cyber threats. The 2015 DBIR expands its investigation into nine common threat patterns and sizes up the effects of all types of data breaches, from small data disclosures to events that hit the headlines.

Introduction 1
Victim Demographics 2
Breach Trends: “Looking Back Before Diving Ahead” 4
Before and Beyond the Breach 7
Indicators of Compromise: “Sharing Is Cyber-Caring” 8
Phishing: “Attn: Sir/Madam” 12
Vulnerabilities: “Do We Need Those Stinking Patches?” 15
Mobile: “I Got 99 Problems and Mobile Malware Isn’t Even 1% of Them” 18
Malware: “Volume, Velocity, and Variation” 21
Industry Profiles: “Raising the Stakes with Some Takes on NAICS” 24
Impact: “In the Beginning, There Was Record Count” 27
Incident Classification Patterns 31
Point-of-Sale Intrusions 35
Payment Card Skimmers 37
Crimeware 39
Web App Attacks 41
Denial-of-Service Attacks 43
Physical Theft/Loss 45
Insider Misuse 46
Miscellaneous Errors 49
Cyber-Espionage 52
Wrap-Up 55
Appendix A: Year in Review 57
Appendix B: Methodology 59
Appendix C: Contributing Organizations 61
Appendix D: The Internet of Things 62

Cliquer pour accéder à rp_data-breach-investigation-report-2015_en_xg.pdf


Laisser un commentaire

Catégories