Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

Data breach

This is a good article. Click here for more information.
From Wikipedia, the free encyclopedia
Intentional or unintentional release of secure information

Adata breach, also known asdata leakage, is "the unauthorized exposure, disclosure, or loss ofpersonal information".[1]

Attackers have a variety of motives, from financial gain topolitical activism,political repression, andespionage. There are several technical root causes of data breaches, including accidental or intentional disclosure of information by insiders, loss or theft ofunencrypted devices, hacking into a system by exploitingsoftware vulnerabilities, andsocial engineering attacks such asphishing where insiders are tricked into disclosing information. Although prevention efforts by the company holding the data can reduce the risk of data breach, it cannot bring it to zero.

The first reported breach was in 2002 and the number occurring each year has grown since then. A large number of data breaches are never detected. If a breach is made known to the company holding the data, post-breach efforts commonly include containing the breach, investigating its scope and cause, and notifications to people whose records were compromised, as required by law in many jurisdictions. Law enforcement agencies may investigate breaches, although the hackers responsible are rarely caught.

Many criminals sell data obtained in breaches on thedark web. Thus, people whose personal data was compromised are at elevated risk ofidentity theft for years afterwards and a significant number will become victims of this crime.Data breach notification laws in many jurisdictions, including allstates of the United States andEuropean Union member states, require the notification of people whose data has been breached. Lawsuits against the company that was breached are common, although few victims receive money from them. There is little empirical evidence of economic harm to firms from breaches except the direct cost, although there is some evidence suggesting a temporary, short-term decline instock price.

Definition

[edit]

A data breach is a violation of "organizational, regulatory, legislative or contractual" law or policy[2] that causes "the unauthorized exposure, disclosure, or loss ofpersonal information".[1] Legal and contractual definitions vary.[3][2] Some researchers include other types of information, for exampleintellectual property orclassified information.[4] However, companies mostly disclose breaches because it is required by law,[5] and only personal information is covered bydata breach notification laws.[6][7]

Prevalence

[edit]
See also:List of data breaches

The first reported data breach occurred on 5 April 2002[8] when 250,000social security numbers collected by theState of California were stolen from a data center.[9] Before the widespread adoption ofdata breach notification laws around 2005, the prevalence of data breaches is difficult to determine. Even afterwards, statistics per year cannot be relied on because data breaches may be reported years after they occurred,[10] or not reported at all.[11] Nevertheless, the statistics show a continued increase in the number and severity of data breaches that continues as of 2022[update].[12] In 2016, researcherSasha Romanosky estimated that data breaches (excludingphishing) outnumbered other security breaches by a factor of four.[13]

Perpetrators

[edit]

According to a 2020 estimate, 55 percent of data breaches were caused byorganized crime, 10 percent bysystem administrators, 10 percent byend users such as customers or employees, and 10 percent by states or state-affiliated actors.[14] Opportunistic criminals may cause data breaches—often usingmalware orsocial engineering attacks, but they will typically move on if the security is above average. More organized criminals have more resources and are more focused in theirtargeting of particular data.[15] Both of them sell the information they obtain for financial gain.[16] Another source of data breaches arepolitically motivated hackers, for exampleAnonymous, that target particular objectives.[17] State-sponsored hackers target either citizens of their country or foreign entities, for such purposes aspolitical repression andespionage. Often they use undisclosedzero-day vulnerabilities for which the hackers are paid large sums of money.[18] ThePegasus spyware—ano-click malware developed by the Israeli companyNSO Group that can be installed on most cellphones and spies on the users' activity—has drawn attention both for use against criminals such as drug kingpinEl Chapo as well as political dissidents, facilitating themurder of Jamal Khashoggi.[19]

Causes

[edit]

Technical causes

[edit]

Despite developers' goal of delivering a product that works entirely as intended, virtually allsoftware andhardware contains bugs.[20] If a bug creates a security risk, it is called avulnerability.[21][22][23]Patches are often released to fix identified vulnerabilities, but those that remain unknown (zero days) as well as those that have not been patched are still liable for exploitation.[24] Both software written by the target of the breach and third party software used by them are vulnerable to attack.[22] Thesoftware vendor is rarely legally liable for the cost of breaches, thus creating an incentive to make cheaper but less secure software.[25]

Vulnerabilities vary in their ability to beexploited by malicious actors. The most valuable allow the attacker toinject and run their own code (calledmalware), without the user being aware of it.[21] Some malware is downloaded by users via clicking on a malicious link, but it is also possible for maliciousweb applications to download malware just from visiting the website (drive-by download).Keyloggers, a type of malware that records a user's keystrokes, are often used in data breaches.[26] The majority of data breaches could have been averted by storing all sensitive information in an encrypted format. That way, physical possession of the storage device or access to encrypted information is useless unless the attacker has theencryption key.[27]Hashing is also a good solution for keepingpasswords safe frombrute-force attacks, but only if the algorithm is sufficiently secure.[28]

Many data breaches occur on the hardware operated by a partner of the organization targeted—including the2013 Target data breach and2014 JPMorgan Chase data breach.[29]Outsourcing work to a third party leads to a risk of data breach if that company has lower security standards; in particular, small companies often lack the resources to take as many security precautions.[30][29] As a result, outsourcing agreements often include security guarantees and provisions for what happens in the event of a data breach.[30]

Human causes

[edit]

Human causes of breach are often based on trust of another actor that turns out to be malicious.Social engineering attacks rely on tricking an insider into doing something that compromises the system's security, such as revealing a password or clicking a link to download malware.[31] Data breaches may also be deliberately caused by insiders.[32] One type of social engineering,phishing,[31] obtains a user'scredentials by sending them a malicious message impersonating a legitimate entity, such as a bank, and getting the user to enter their credentials onto a malicious website controlled by the cybercriminal.Two-factor authentication can prevent the malicious actor from using the credentials.[33] Training employees to recognize social engineering is another common strategy.[34]

Another source of breaches is accidental disclosure of information, for example publishing information that should be kept private.[35][36] With the increase inremote work andbring your own device policies, large amounts of corporate data is stored on personal devices of employees. Via carelessness or disregard of company security policies, these devices can be lost or stolen.[37] Technical solutions can prevent many causes of human error, such as encrypting all sensitive data, preventing employees from using insecure passwords, installingantivirus software to prevent malware, and implementing a robust patching system to ensure that all devices are kept up to date.[38]

Breach lifecycle

[edit]

Prevention

[edit]
See also:Information security andData loss prevention software

Although attention to security can reduce the risk of data breach, it cannot bring it to zero. Security is not the only priority of organizations, and an attempt to achieve perfect security would make the technology unusable.[39] Many companies hire achief information security officer (CISO) to oversee the company's information security strategy.[40] To obtain information about potential threats, security professionals will network with each other and share information with other organizations facing similar threats.[41] Defense measures can include an updated incident response strategy, contracts withdigital forensics firms that could investigate a breach,[42]cyber insurance,[43][7] and monitoring thedark web for stolen credentials of employees.[44] In 2024, the United StatesNational Institute of Standards and Technology (NIST) issued a special publication, "Data Confidentiality: Identifying and Protecting Assets Against Data Breaches".[45] TheNIST Cybersecurity Framework also contains information about data protection.[46] Other organizations have released different standards for data protection.[47]

The architecture of a company's systems plays a key role in deterring attackers. Daswani and Elbayadi recommend having only one means ofauthentication,[48] avoiding redundant systems, and making the most secure setting default.[49]Defense in depth anddistributed privilege (requiring multiple authentications to execute an operation) also can make a system more difficult to hack.[50] Giving employees and software the least amount of access necessary to fulfill their functions (principle of least privilege) limits the likelihood and damage of breaches.[48][51] Several data breaches were enabled by reliance onsecurity by obscurity; the victims had put access credentials in publicly accessible files.[52] Nevertheless, prioritizing ease of use is also important because otherwise users might circumvent the security systems.[53] Rigoroussoftware testing, includingpenetration testing, can reduce software vulnerabilities, and must be performed prior to each release even if the company is using acontinuous integration/continuous deployment model where new versions are constantly being rolled out.[54]

The principle ofleast persistence[55]—avoiding the collection of data that is not necessary and destruction of data that is no longer necessary—can mitigate the harm from breaches.[56][57][58] The challenge is that destroying data can be more complex with modern database systems.[59]

Response

[edit]
See also:Computer security incident response team

A large number of data breaches are never detected.[60] Of those that are, most breaches are detected by third parties;[61][62] others are detected by employees or automated systems.[63] Responding to breaches is often the responsibility of a dedicatedcomputer security incident response team, often including technical experts,public relations, and legal counsel.[64][65] Many companies do not have sufficient expertise in-house, and subcontract some of these roles;[66] often, these outside resources are provided by the cyber insurance policy.[67] After a data breach becomes known to the company, the next steps typically include confirming it occurred, notifying the response team, and attempting to contain the damage.[68]

To stop exfiltration of data, common strategies include shutting down affected servers, taking them offline,patching the vulnerability, andrebuilding.[69] Once the exact way that the data was compromised is identified, there is typically only one or two technical vulnerabilities that need to be addressed in order to contain the breach and prevent it from reoccurring.[70] Apenetration test can then verify that the fix is working as expected.[71] Ifmalware is involved, the organization must investigate and close all infiltration and exfiltration vectors, as well as locate and remove all malware from its systems.[72] If data was posted on thedark web, companies may attempt to have it taken down.[73] Containing the breach can compromise investigation, and some tactics (such as shutting down servers) can violate the company's contractual obligations.[74]

Gathering data about the breach can facilitate later litigation or criminal prosecution,[75] but only if the data is gathered according to legal standards and thechain of custody is maintained.[76] Database forensics can narrow down the records involved, limiting the scope of the incident.[77] Extensive investigation may be undertaken, which can be even more expensive thanlitigation.[62] In the United States, breaches may be investigated by government agencies such as theOffice for Civil Rights, theUnited States Department of Health and Human Services, and theFederal Trade Commission (FTC).[78] Law enforcement agencies may investigate breaches[79] although the hackers responsible are rarely caught.[80]

Notifications are typically sent out as required by law.[81] Many companies offer freecredit monitoring to people affected by a data breach, although only around 5 percent of those eligible take advantage of the service.[82] Issuing new credit cards to consumers, although expensive, is an effective strategy to reduce the risk ofcredit card fraud.[82] Companies try to restore trust in their business operations and take steps to prevent a breach from reoccurring.[83]

Consequences

[edit]

For consumers

[edit]

After a data breach, criminals make money by selling data, such as usernames, passwords,social media orcustomer loyalty account information,debit andcredit card numbers,[16] and personal health information (seemedical data breach).[84] Criminals often sell this data on thedark web—parts of the internet where it is difficult to trace users and illicit activity is widespread—using platforms like.onion orI2P.[85] Originating in the 2000s, the dark web, followed by untraceablecryptocurrencies such asBitcoin in the 2010s, made it possible for criminals to sell data obtained in breaches with minimal risk of getting caught, facilitating an increase in hacking.[86][87] One popular darknet marketplace,Silk Road, was shut down in 2013 and its operators arrested, but several other marketplaces emerged in its place.[88]Telegram is also a popular forum for illegal sales of data.[89]

This information may be used for a variety of purposes, such asspamming, obtaining products with a victim's loyalty or payment information,identity theft,prescription drug fraud, orinsurance fraud.[90] The threat of data breach or revealing information obtained in a data breach can be used forextortion.[16]

Consumers may suffer various forms of tangible or intangible harm from the theft of their personal data, or not notice any harm.[91] A significant portion of those affected by a data breach become victims ofidentity theft.[82] A person's identifying information often circulates on the dark web for years, causing an increased risk of identity theft regardless of remediation efforts.[80][92] Even if a customer does not end up footing the bill forcredit card fraud or identity theft, they have to spend time resolving the situation.[93][94] Intangible harms includedoxxing (publicly revealing someone's personal information), for example medication usage or personal photos.[95]

For organizations

[edit]

There is little empirical evidence of economic harm from breaches except the direct cost, although there is some evidence suggesting a temporary, short-term decline instock price.[96] Other impacts on the company can range from lost business, reduced employee productivity due to systems being offline or personnel redirected to working on the breach,[97] resignation or firing of senior executives,[78]reputational damage,[78][98] and increasing the future cost of auditing or security.[78] Consumer losses from a breach are usually a negativeexternality for the business.[99] Some experts have argued that the evidence suggests there is not enough direct costs or reputational damage from data breaches to sufficientlyincentivize their prevention.[100][101]

Estimating the cost of data breaches is difficult, both because not all breaches are reported and also because calculating the impact of breaches in financial terms is not straightforward. There are multiple ways of calculating the cost to businesses, especially when it comes to personnel time dedicated to dealing with the breach.[102] Author Kevvie Fowler estimates that more than half the direct cost incurred by companies is in the form of litigation expenses and services provided to affected individuals, with the remaining cost split between notification and detection, including forensics and investigation. He argues that these costs are reduced if the organization has invested in security prior to the breach or has previous experience with breaches. The moredata records involved, the more expensive a breach typically will be.[103] In 2016, researcherSasha Romanosky estimated that while the mean breach cost around the targeted firm $5 million, this figure was inflated by a few highly expensive breaches, and the typical data breach was much less costly, around $200,000. Romanosky estimated the total annual cost to corporations in the United States to be around $10 billion.[104]

Laws

[edit]

Notification

[edit]
Main article:Data breach notification laws

The law regarding data breaches is often found inlegislation to protect privacy more generally, and is dominated by provisions mandating notification when breaches occur.[105] Laws differ greatly in how breaches are defined,[3] what type of information is protected, the deadline for notification,[6] and who hasstanding to sue if the law is violated.[106] Notification laws increasetransparency and provide a reputational incentive for companies to reduce breaches.[107] The cost of notifying the breach can be high if many people were affected and is incurred regardless of the company's responsibility, so it can function like astrict liability fine.[108]

As of 2024[update],Thomas on Data Breach listed 62United Nations member states that are covered by data breach notification laws. Some other countries require breach notification in more generaldata protection laws.[109] Shortly after the first reported data breach in April 2002, California passeda law requiring notification when an individual's personal information was breached.[9] In the United States, notification laws proliferated after the February 2005ChoicePoint data breach, widely publicized in part because of the large number of people affected (more than 140,000) and also because of outrage that the company initially informed only affected people in California.[110][111] In 2018, theEuropean Union'sGeneral Data Protection Regulation (GDPR) took effect. The GDPR requires notification within 72 hours, with very high fines possible for large companies not in compliance. This regulation also stimulated the tightening of data privacy laws elsewhere.[112][113] As of 2022[update], the onlyUnited States federal law requiring notification for data breaches is limited to medical data regulated underHIPAA, but all 50 states (since Alabama passed a law in 2018) have their own general data breach notification laws.[113]

Security safeguards

[edit]

Measures to protect data from a breach are typically absent from the law or vague.[105] Filling this gap is standards required bycyber insurance, which is held by most large companies andfunctions asde facto regulation.[114][115] Of the laws that do exist, there are two main approaches—one that prescribes specific standards to follow, and thereasonableness approach.[116] The former is rarely used due to a lack of flexibility and reluctance of legislators to arbitrate technical issues; with the latter approach, the law is vague but specific standards can emerge fromcase law.[117] Companies often prefer the standards approach for providing greaterlegal certainty, but they might check all the boxes without providing a secure product.[118] An additional flaw is that the laws are poorly enforced, with penalties often much less than the cost of a breach, and many companies do not follow them.[119]

Litigation

[edit]

Manyclass-action lawsuits,derivative suits, and other litigation have been brought after data breaches.[120] They are oftensettled regardless of the merits of the case due to the high cost of litigation.[121][122] Even if a settlement is paid, few affected consumers receive any money as it usually is only cents to a few dollars per victim.[78][122] Legal scholarsDaniel J. Solove andWoodrow Hartzog argue that "Litigation has increased the costs of data breaches but has accomplished little else."[123] Plaintiffs often struggle to prove that they suffered harm from a data breach.[123] The contribution of a company's actions to a data breach varies,[119][124] and likewise the liability for the damage resulting for data breaches is a contested matter. It is disputed what standard should be applied, whether it is strict liability,negligence, or something else.[124]

See also

[edit]

References

[edit]
  1. ^abSolove & Hartzog 2022, p. 5.
  2. ^abFowler 2016, p. 2.
  3. ^abSolove & Hartzog 2022, p. 41.
  4. ^Shukla et al. 2022, pp. 47–48.
  5. ^National Academies of Sciences, Engineering, and Medicine 2016, p. 18.
  6. ^abSolove & Hartzog 2022, p. 42.
  7. ^abFowler 2016, p. 45.
  8. ^Joerling 2010, p. 468 fn 7.
  9. ^abLesemann 2010, p. 206.
  10. ^Solove & Hartzog 2022, p. 18.
  11. ^Solove & Hartzog 2022, p. 29.
  12. ^Solove & Hartzog 2022, pp. 17–18.
  13. ^National Academies of Sciences, Engineering, and Medicine 2016, p. 9.
  14. ^Crawley 2021, p. 46.
  15. ^Fowler 2016, pp. 7–8.
  16. ^abcFowler 2016, p. 13.
  17. ^Fowler 2016, pp. 9–10.
  18. ^Fowler 2016, pp. 10–11.
  19. ^Kaster & Ensign 2023, p. 355.
  20. ^Ablon & Bogart 2017, p. 1.
  21. ^abAblon & Bogart 2017, p. 2.
  22. ^abDaswani & Elbayadi 2021, p. 25.
  23. ^Seaman 2020, pp. 47–48.
  24. ^Daswani & Elbayadi 2021, pp. 26–27.
  25. ^Sloan & Warner 2019, pp. 104–105.
  26. ^Daswani & Elbayadi 2021, p. 19–22.
  27. ^Daswani & Elbayadi 2021, p. 15.
  28. ^Ntantogian, Malliaros & Xenakis 2019.
  29. ^abDaswani & Elbayadi 2021, pp. 22–23.
  30. ^abFowler 2016, pp. 19–20.
  31. ^abSloan & Warner 2019, p. 94.
  32. ^Makridis 2021, p. 3.
  33. ^Daswani & Elbayadi 2021, pp. 16–19.
  34. ^Sloan & Warner 2019, pp. 106–107.
  35. ^Daswani & Elbayadi 2021, p. 28.
  36. ^Fowler 2016, p. 19.
  37. ^Fowler 2016, pp. 18–19.
  38. ^Daswani & Elbayadi 2021, pp. 31–32.
  39. ^Solove & Hartzog 2022, pp. 69–70.
  40. ^Daswani & Elbayadi 2021, pp. 7, 9–10.
  41. ^Daswani & Elbayadi 2021, pp. 200–201.
  42. ^Daswani & Elbayadi 2021, pp. 203–204.
  43. ^Daswani & Elbayadi 2021, p. 205.
  44. ^Daswani & Elbayadi 2021, pp. 206–207.
  45. ^Fisheret al. 2024, Title page.
  46. ^Fisheret al. 2024, p. 2.
  47. ^Fowler 2016, p. 210.
  48. ^abDaswani & Elbayadi 2021, p. 217.
  49. ^Daswani & Elbayadi 2021, pp. 215–216.
  50. ^Tjoaet al. 2024, p. 14.
  51. ^Lenhard 2022, p. 53.
  52. ^Daswani & Elbayadi 2021, p. 218.
  53. ^Daswani & Elbayadi 2021, pp. 218–219.
  54. ^Daswani & Elbayadi 2021, pp. 314–315.
  55. ^Tjoaet al. 2024, p. 68.
  56. ^Lenhard 2022, p. 60.
  57. ^Fowler 2016, p. 184.
  58. ^Solove & Hartzog 2022, p. 146.
  59. ^Tjoaet al. 2024, p. 69.
  60. ^Crawley 2021, p. 39.
  61. ^Fowler 2016, p. 64.
  62. ^abNational Academies of Sciences, Engineering, and Medicine 2016, p. 25.
  63. ^Fowler 2016, p. 4.
  64. ^Crawley 2021, p. 97.
  65. ^Fowler 2016, pp. 5, 32.
  66. ^Fowler 2016, p. 86.
  67. ^Fowler 2016, p. 94.
  68. ^Fowler 2016, pp. 4–5.
  69. ^Fowler 2016, pp. 120–122.
  70. ^Fowler 2016, p. 115.
  71. ^Fowler 2016, p. 116.
  72. ^Fowler 2016, pp. 117–118.
  73. ^Fowler 2016, p. 119.
  74. ^Fowler 2016, p. 124.
  75. ^Fowler 2016, pp. 81–82.
  76. ^Fowler 2016, p. 83.
  77. ^Fowler 2016, p. 128.
  78. ^abcdeNational Academies of Sciences, Engineering, and Medicine 2016, p. 22.
  79. ^Fowler 2016, p. 44.
  80. ^abSolove & Hartzog 2022, p. 58.
  81. ^Fowler 2016, p. 5, 44.
  82. ^abcNational Academies of Sciences, Engineering, and Medicine 2016, p. 13.
  83. ^Fowler 2016, pp. 5–6.
  84. ^Fowler 2016, p. 14.
  85. ^Fowler 2016, pp. 12–13.
  86. ^Davidoff 2019, "Modern dark data brokers".
  87. ^Solove & Hartzog 2022, p. 21.
  88. ^Howell, Christian Jordan; Maimon, David (2 December 2022)."Darknet markets generate millions in revenue selling stolen personal data, supply chain study finds".The Conversation. Retrieved22 April 2024.
  89. ^Garkava, Taisiia; Moneva, Asier; Leukfeldt, E. Rutger (2024)."Stolen data markets on Telegram: A crime script analysis and situational crime prevention measures".Trends in Organized Crime.doi:10.1007/s12117-024-09532-6.
  90. ^Fowler 2016, pp. 13–14.
  91. ^National Academies of Sciences, Engineering, and Medicine 2016, p. 27.
  92. ^National Academies of Sciences, Engineering, and Medicine 2016, pp. 30–31.
  93. ^National Academies of Sciences, Engineering, and Medicine 2016, p. 29.
  94. ^Solove & Hartzog 2022, p. 56.
  95. ^National Academies of Sciences, Engineering, and Medicine 2016, pp. 27–29.
  96. ^Makridis 2021, p. 1.
  97. ^Fowler 2016, p. 22.
  98. ^Fowler 2016, p. 41.
  99. ^Sloan & Warner 2019, p. 104.
  100. ^Makridis 2021, pp. 1, 7.
  101. ^Sloan & Warner 2019, p. 64.
  102. ^National Academies of Sciences, Engineering, and Medicine 2016, pp. 8–10.
  103. ^Fowler 2016, p. 21.
  104. ^National Academies of Sciences, Engineering, and Medicine 2016, p. 10.
  105. ^abSolove & Hartzog 2022, p. 10.
  106. ^Solove & Hartzog 2022, p. 43.
  107. ^Solove & Hartzog 2022, p. 44.
  108. ^Solove & Hartzog 2022, p. 45.
  109. ^Thomas 2023, pp. xxvii, xxix, xxxii–xxxiii, xxxiv.
  110. ^Lesemann 2010, pp. 206–207.
  111. ^Joerling 2010, pp. 468–469.
  112. ^Seaman 2020, pp. 6–7.
  113. ^abSolove & Hartzog 2022, p. 40.
  114. ^National Academies of Sciences, Engineering, and Medicine 2016, p. 24.
  115. ^Talesh 2018, p. 237.
  116. ^Solove & Hartzog 2022, p. 48.
  117. ^Solove & Hartzog 2022, pp. 48–49.
  118. ^Solove & Hartzog 2022, p. 52.
  119. ^abSolove & Hartzog 2022, p. 53.
  120. ^Fowler 2016, p. 5.
  121. ^Fowler 2016, p. 222.
  122. ^abSolove & Hartzog 2022, pp. 55, 59.
  123. ^abSolove & Hartzog 2022, p. 55.
  124. ^abNational Academies of Sciences, Engineering, and Medicine 2016, p. 23.

Sources

[edit]
Related security categories
vectorial version
vectorial version
Threats
Defenses
Retrieved from "https://en.wikipedia.org/w/index.php?title=Data_breach&oldid=1268391993"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2025 Movatter.jp