skip to main content
10.1145/1179559.1179561acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article

A statistical analysis of disclosed storage security breaches

Published:30 October 2006Publication History

ABSTRACT

Many storage security breaches have recently been reported in the mass media as the direct result of new breach disclosure state laws across the United States (unfortunately, not internationally). In this paper, we provide an empirical analysis of disclosed storage security breaches for the period of 2005-2006. By processing raw data from the best available sources, we seek to understand the what, who, how, where, and when questions about storage security breaches so that others can build upon this evidence when developing best practices for preventing and mitigating storage breaches. While some policy formulation has already started in reaction to media reports (many without empirical analysis), this work provides initial empirical analysis upon which future empirical analysis and future policy decisions can be based.

References

  1. A chronology of data breaches reported since the choicepoint incident (list). Privacy Rights Clearinghouse http://www.privacyrights.org/ar/ChronDataBreaches.htm.Google ScholarGoogle Scholar
  2. Dataloss mailing list. Attrition.org http://attrition.org/security/dataloss.html.Google ScholarGoogle Scholar
  3. Entities that suffered large personal data incidents (list). Attrition.org http://attrition.org/errata/dataloss.Google ScholarGoogle Scholar
  4. Recommended practices on notice of security breach involving personal information. State of California Department of Consumer Affairs/Office of Privacy Protection, April 2006.Google ScholarGoogle Scholar
  5. A. Acquisti, A. Friedman, and R. Telang. Is there a cost to privacy breaches? an event study. In Workshop on the Economics of Information Security (WEIS), 2006.Google ScholarGoogle Scholar
  6. C. Conkey. Identity theft: Shielding yourself. July 14, 2006.Google ScholarGoogle Scholar
  7. R. Hasan, S. Myagmar, A.J. Lee, and W. Yurcik. Toward a threat model for storage systems. In ACM International Workshop on Storage Security and Survivability (StorageSS), pages 94--102, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. M. Hines. Data losses may spark lawsuits. In eWeek, June 12, 2006.Google ScholarGoogle Scholar
  9. P. Mueller. How to survive data breach laws. Network Computing, June 8, 2006.Google ScholarGoogle Scholar
  10. B. Schneier. Risks of third-party data. Communications of the ACM, May 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. R. Tehan. Personal Data Security Breaches: Context and Incident Summaries. In Congressional Research Service Report for Congress, December 16, 2005.Google ScholarGoogle Scholar

Index Terms

  1. A statistical analysis of disclosed storage security breaches

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            StorageSS '06: Proceedings of the second ACM workshop on Storage security and survivability
            October 2006
            94 pages
            ISBN:1595935525
            DOI:10.1145/1179559

            Copyright © 2006 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 30 October 2006

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • Article

            Upcoming Conference

            CCS '24
            ACM SIGSAC Conference on Computer and Communications Security
            October 14 - 18, 2024
            Salt Lake City , UT , USA

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader