ResearchSpace

Treating personal data like digital pollution

Show simple item record

dc.contributor.author Burke, Ivan D
dc.contributor.author Van Heerden, Renier P
dc.date.accessioned 2017-09-22T10:23:06Z
dc.date.available 2017-09-22T10:23:06Z
dc.date.issued 2017-06
dc.identifier.citation Burke, I.D. and Van Heerden, R.P. 2017. Treating personal data like digital pollution. 16th European Conference on Cyber Warfare and Security, 29-30 June 2017, Dublin, Ireland en_US
dc.identifier.isbn 978-1-5108-4519-0
dc.identifier.uri http://toc.proceedings.com/35467webtoc.pdf
dc.identifier.uri https://www.researchgate.net/profile/Ivan_Burke/publication/318111002_Treating_Personal_Data_Like_Digital_Pollution/links/595a4813aca2728a137aabce/Treating-Personal-Data-Like-Digital-Pollution.pdf
dc.identifier.uri http://hdl.handle.net/10204/9593
dc.description Copyright: 2017 The Authors. 16th European Conference on Cyber Warfare and Security, 29-30 June 2017, Dublin, Ireland en_US
dc.description.abstract During the past 10 years data breaches have become more frequent than ever. Large volumes of personal and corporate data are being leaked via these breaches. The corporate responses to these breaches, as well as, the remediation of these breaches are often not sufficient. Similarly to how production companies should be taken to task for polluting the physical environment due to bad business practices, IT institutions should be made aware of their contribution to Cyber pollution. In our article we define the concept of cyber pollution as unmaintained or obsolete devices connect to the internet and corporate networks. This paper breaks down the current state of data breach disclosures within the Europe by providing statistics on large scale data breach disclosures from 2013 till 2016. This paper attempts to model the increase of threat exposure over time similar to that of pollution breaches within the physical environment. Over time small openings or vulnerabilities within systems can lead to exploitation of whole systems. By modelling these breaches as pollution we aim to make the concept of cyber pollution a more tangible concept for IT managers to relay to staff and upper management. The model is validated using anonymised corporate network traffic and Open Source penetration testing software. en_US
dc.language.iso en en_US
dc.relation.ispartofseries Worklist;19239
dc.subject Personal data en_US
dc.subject Digital pollution en_US
dc.title Treating personal data like digital pollution en_US
dc.type Conference Presentation en_US
dc.identifier.apacitation Burke, I. D., & Van Heerden, R. P. (2017). Treating personal data like digital pollution. http://hdl.handle.net/10204/9593 en_ZA
dc.identifier.chicagocitation Burke, Ivan D, and Renier P Van Heerden. "Treating personal data like digital pollution." (2017): http://hdl.handle.net/10204/9593 en_ZA
dc.identifier.vancouvercitation Burke ID, Van Heerden RP, Treating personal data like digital pollution; 2017. http://hdl.handle.net/10204/9593 . en_ZA
dc.identifier.ris TY - Conference Presentation AU - Burke, Ivan D AU - Van Heerden, Renier P AB - During the past 10 years data breaches have become more frequent than ever. Large volumes of personal and corporate data are being leaked via these breaches. The corporate responses to these breaches, as well as, the remediation of these breaches are often not sufficient. Similarly to how production companies should be taken to task for polluting the physical environment due to bad business practices, IT institutions should be made aware of their contribution to Cyber pollution. In our article we define the concept of cyber pollution as unmaintained or obsolete devices connect to the internet and corporate networks. This paper breaks down the current state of data breach disclosures within the Europe by providing statistics on large scale data breach disclosures from 2013 till 2016. This paper attempts to model the increase of threat exposure over time similar to that of pollution breaches within the physical environment. Over time small openings or vulnerabilities within systems can lead to exploitation of whole systems. By modelling these breaches as pollution we aim to make the concept of cyber pollution a more tangible concept for IT managers to relay to staff and upper management. The model is validated using anonymised corporate network traffic and Open Source penetration testing software. DA - 2017-06 DB - ResearchSpace DP - CSIR KW - Personal data KW - Digital pollution LK - https://researchspace.csir.co.za PY - 2017 SM - 978-1-5108-4519-0 T1 - Treating personal data like digital pollution TI - Treating personal data like digital pollution UR - http://hdl.handle.net/10204/9593 ER - en_ZA


Files in this item

This item appears in the following Collection(s)

Show simple item record