Experiencing M I S
Tenth Edition
Chapter Extension 14
Data Breaches
Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved
Study Questions
C E 14.1 What is a data breach?
C E 14.2 How do data breaches happen?
C E 14.3 How should organizations respond to data breaches?
C E 14.4 What are the legal consequences of a data breach?
C E 14.5 How can data breaches be prevented?
C E 14.6 What is your role in I S Security?
Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved
Costs of Handling Data Breaches
C E 14.1 What is a data breach?
Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved
Costs of Handling a Data Breach
C E 14.1 What is a data breach?
Direct Costs
Indirect Costs
Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved
What Are the Odds?
C E 14.1 What is a data breach?
Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved
Well-Known Data Breaches
C E 14.1 What is a data breach?
Figure C E 14.1 Well-Known Data Breaches
Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved
The Largest Data Breaches
C E 14.1 What is a data breach?
Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved
Why Do Data Breaches Happen?
C E 14.1 What is a data breach?
Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved
Attack Vectors
C E 14.2 How do data breaches happen?
Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved
Hitting Target
C E 14.2 How do data breaches happen?
Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved
The Target Data Breach
C E 14.2 How do data breaches happen?
Figure C E 14.2 Target Data Breach
Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved
The Damage
C E 14.2 How do data breaches happen?
Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved
Collateral Damage
C E 14.2 How do data breaches happen?
Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved
Responding to Data Breaches (1 of 2)
C E 14.3 How should organizations respond to data breaches?
Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved
Responding to Data Breaches (2 of 2)
C E 14.3 How should organizations respond to data breaches?
Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved
Best Practices for Notifying Users of a Data Breach
C E 14.3 How should organizations respond to data breaches?
Figure C E 14.3 Best Practices for Notifying Users of a Data Breach
Best Practice | The Right Way | The Wrong Way |
1. Be transparent in your activity and demonstrate that you are getting the word out. | Directly email every affected user with details about the data breach, and include a popup advisory on the company’s most visited page. | Include a vague reference in a rarely-read press release that includes plenty of technical jargon. |
2. Follow your normal media routine. | Notification is sent to local reporters that usually report on the organization as well as a typical press release. | Only send the notification to a small number of users. |
3. Avoid absolutes. | State that, so far, the data breach has affected a certain number of users but the investigation is still ongoing. | State that the breach only affected a certain number of users, and no more. |
4. Avoid misleading statements. | “We are investigating the possibility of lost credit card data.” | “We don’t have any evidence that credit cards have been compromised.” But you’ve received notification from a credit processor that an investigation is under way. |
5. Don’t attempt to withhold key details. | “It appears that at least 40 percent of user accounts were compromised.” | “I can’t comment on the number of accounts compromised at this time.” |
6. Stay focused and concise. | Give a brief, concise, and factual statement about the data breach. | Provide extraneous details about failings of internal backup, off-site data policies, and unrelated criminal investigations. |
Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved
P C I D S S Standards
C E 14.4 What are the legal consequences of a data breach?
Figure C E 14.4 P C I D S S Standards
Blank | P C I D S S Requirements |
Build and Maintain a Secure Network and Systems | 1.Install and maintain a firewall configuration to protect cardholder data. 2. Do not use vendor-supplied defaults for system passwords and other security parameters. |
Protect Cardholder Data | 3. Protect stored cardholder data. 4. Encrypt transmission of cardholder data across open, public networks. |
Maintain a Vulnerability Management Program | 5. Protect all systems against malware, and regularly update antivirus software or programs. 6. Develop and maintain secure systems and applications. |
Implement Strong Access Control Measures | 7. Restrict access to cardholder data by businesses on a need-to-know basis. 8. Identify and authenticate access to system components. 9. Restrict physical access to cardholder data. |
Regularly Monitor and Test Networks | 10. Track and monitor all access to network resources and cardholder data. 11. Regularly test security systems and processes. |
Maintain an Information Security Policy | 12. Maintain a policy that addresses information security for all personnel. |
Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved
Regulatory Laws Govern the Secure Storage of Data in Certain Industries
C E 14.4 What are the legal consequences of a data breach?
Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved
Preventing Data Breaches (1 of 2)
C E 14.5 How can data breaches be prevented?
Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved
Preventing Data Breaches (2 of 2)
C E 14.5 How can data breaches be prevented?
Figure C E 14.5 Suggestions for Preventing Data Loss
Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved
Your Role in I S Security
C E 14.6 What is your role in I S security?
Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved
Common (Weak) Passwords
C E 14.6 What is your role in I S security?
Figure C E 14.6 The Most Commonly Used Weak Passwords
Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved
Passwords and Password Etiquette (1 of 2)
C E 14.6 What is your role in I S security?
and special characters (such as
Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved
Passwords and Password Etiquette (2 of 2)
C E 14.6 What is your role in I S security?
Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved
Active Review
C E 14.1 What is a data breach?
C E 14.2 How do data breaches happen?
C E 14.3 How should organizations respond to data breaches?
C E 14.4 What are the legal consequences of a data breach?
C E 14.5 How can data breaches be prevented?
C E 14.6 What is your role in I S Security?
Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved
Copyright
This work is protected by United States copyright laws and is provided solely for the use of instructors in teaching their courses and assessing student learning. Dissemination or sale of any part of this work (including on the World Wide Web) will destroy the integrity of the work and is not permitted. The work and materials from it should never be made available to students except by instructors using the accompanying text in their classes. All recipients of this work are expected to abide by these restrictions and to honor the intended pedagogical purposes and the needs of other instructors who rely on these materials.
Copyright © 2023, 2021, 2019 Pearson Education, Inc. All Rights Reserved