Violações de dados são assuntos complexos, geralmente envolvendo alguma combinação de fatores humanos, dispositivos de hardware, exploited configurations or malicious software. As can be expected, data breach response activities—investigation, containment, eradication, notificação, and recovery—are proportionately complex.
The report highlights 16 average breach scenarios. Contudo, each scenario has its alterations. This fact links to a variety of outcomes involving the damage level and the overall aftermath of a breach incident.
além disso, the report breaks down into four bundled groups:
- The human factor or four scenarios stressing on the human-related threat actors;
- Conduit devices and four related scenarios about device misuse;
- Configuration exploitation and four scenarios on reconfigured or misconfigured settings;
- Malicious software and four scenarios on “special-purpose illicit software”.
The researchers explained that they categorized each scenario in one of two ways: “prevalent” or “lethal.” The “prevalent” scenarios are the ones seen most frequently. Por outro lado, “lethal” scenarios are those seen less frequently, but considered most destructive. Of the all the 16 cenários, the team identified ten as the most prevalent and six as the most lethal.
The Human Element in Data Breaches
Human beings play a significant role in data breaches and cybersecurity incidents. This should come as no surprise – after all, we are the ones who produce, consume, usar, depend on, e como resultado, have to secure and protect digital data. Por causa disso, humans fulfill the roles of threat actors, targeted victims, cybersecurity defenders and incident response stakeholders, o relatório explica.
A conclusão? The team looked at data over the previous three years and saw that nearly half (49%) of all breached involved one or more the human elements.
For full technical and analytical disclosure, dê uma olhada no Relatório completo.