2010 Data Breach Investigations Report: Difference between revisions
Jump to navigation
Jump to search
Line 5: | Line 5: | ||
==Full Citation== | ==Full Citation== | ||
Verizon, 2010 Data Breach Investigations Report (2010). [http://www.verizonbusiness.com/resources/reports/rp_2010-data-breach-report_en_xg.pdf ''Web''] | Verizon, ''2010 Data Breach Investigations Report'' (2010). Online paper. [http://www.verizonbusiness.com/resources/reports/rp_2010-data-breach-report_en_xg.pdf ''Web''] | ||
[http://cyber.law.harvard.edu/cybersecurity/Special:Bibliography?f=wikibiblio.bib&title=Special:Bibliography&view=&action=&keyword=verizon_2010 ''BibTeX''] | [http://cyber.law.harvard.edu/cybersecurity/Special:Bibliography?f=wikibiblio.bib&title=Special:Bibliography&view=&action=&keyword=verizon_2010 ''BibTeX''] |
Revision as of 08:51, 19 August 2010
Full Title of Reference
2010 Data Breach Investigations Report
Full Citation
Verizon, 2010 Data Breach Investigations Report (2010). Online paper. Web
Categorization
- Type of Reference: Industry Reports
- Issues: Cyberwar; Incentives
- Approaches: Deterrence
Key Words
Computer Network Attack, COTS Software, Cyber Warfare, Department of Homeland Security, Denial of Service Attacks, Hackers, Intelligence Community, Malicious Code (Malware), National Security, Risk Modeling, Sponsored Attacks, State Affiliation, Worm, Zero-Day Exploit
Synopsis
In partnership with the U.S. Secret Service (USSS), Verizon
Additional Notes and Highlights
Expertise required: None