1、2017 Data Breach Investigations Report 10th Edition OFXPB U2FsdGVkX19xySK0fJn+xJH2VKLfWI8u+gK2bIHpVeoudbc5Slk0HosGiUNH7oiq CNjiSkfygVslq77WCIM0rqxOZoW/qGMN+eqKMBnhfkhWgtAtcnGc2xm9vxpx5quA Incidents vs breaches We talk a lot about incidents and breaches and we use the following definitions: Incident:
2、 A security event that compromises the integrity, confidentiality or availability of an information asset. Breach: An incident that results in the confirmed disclosurenot just potential exposureof data to an unauthorized party. In the 2009 report, we wrote: “These findings relate specifically to the
3、 occurrence (likelihood) of security breaches leading to data compromise not attacks, not impact, not general security incidents and not risk.” The study has since evolved to include security incidents and not just breaches for many findings, but the rest of the statement holds true to this day. The
4、 information, provided in aggregate, is filtered in many ways to make it relevant to you (e.g., by industry, actor motive). It is a piece of the information security puzzlean awesome corner piece that can get you startedbut just a piece nonetheless. The rest is filled in by you. You (hopefully) know
5、 the controls that you do or do not currently have to mitigate the effectiveness of the threat actions most commonly taken against your industry. You know the assets that store sensitive data and the data flow within your environment. If you dont get on that. You also know your own incident and data
6、-loss history. Use your own knowledge combined with the data from our report; they complement each other. First-time reader? Dont be shywelcome to the party. As always, this report is comprised of real-world data breaches and security incidentseither investigated by us or provided by one of our outs