您好,欢迎访问三七文档
©2010Verizon.AllRightsReserved.PTE1462607/102010DataBreachInvestigationsReport3MethodologyDataSource•VerizonBusinessInvestigativeResponseTeam•NEW:UnitedStatesSecretService(USSS)CollectionandAnalysis•VERISframeworkusedtocollectdataafterinvestigation•Casedataanonymizedandaggregated•RISKIntelligenceteamprovidesanalyticsDataSample•6yearsofforensicinvestigations(notinternalVerizonincidents)•900breaches,900millionstolenrecordsincombineddataset4VERISFrameworkTheIncidentClassificationsectionemploysVerizon’sA4threatmodel12345IncidentasachainofeventsAsecurityincident(orthreatscenario)ismodeledasaseriesofevents.Everyeventiscomprisedofthefollowing4A’s:Agent:WhoseactionsaffectedtheassetAction:WhatactionsaffectedtheassetAsset:WhichassetswereaffectedAttribute:Howtheassetwasaffected©2010Verizon.AllRightsReserved.PTE1462607/102010DataBreachInvestigationsReportRESULTS&ANALYSIS6Assets&Data7Demographics8ThreatAgents9ExternalAgents910ExternalAgents1011InternalAgents12PartnerAgents13ThreatActions14HackingTypes15HackingPathways16MalwareInfectionVector17MalwareFunctionality18MalwareCustomization20MisuseTypes21TimelineofEvents22Assets&Data23Assets&Data24Conclusions&Recommendations25Conclusions&RecommendationsAssetsMostdatacompromisedfromservers&appsDesktops/laptopsincreasing;relatedtostolencredentialsMostcriminalsinterestedincashableformsofdataDiscovery&ResponseDiscoverystilltakesalongtimeandislargelyduetothirdpartiesResponseandcontainmentslowandpronetomishapMitigationThebasics–ifdoneconsistently–aresufficientinmostcasesKeepoutsidersout;theyareincreasinglydifficulttocontrolonceinRestrictandmonitorinsiders;disableaccesswhentheyleaveInmonitoringevents:lookoutforhaystacks–notneedlesPlan,prepare,train,andtestforatimelyandeffectiveresponse26DBIR:::securityblog.verizonbusiness.comEmail:dbir@lists.verizonbusiness.com
三七文档所有资源均是用户自行上传分享,仅供网友学习交流,未经上传用户书面授权,请勿作他用。
本文标题:6--数据泄露报告
链接地址:https://www.777doc.com/doc-6204539 .html