Cybersecurity 1-3
Cybersecurity 1-3
Cybersecurity 1-3
BY
NIGERIA.
ENGINEERING
OCTOBER, 2023
CERTIFICATION
This is to certify that this project work is done by OWOLABI PHILIP IYANUOLUWA (Matric no:
184380) in the Department of Computer Science and Engineering, Ladoke Akintola University of
Technology, Ogbomoso, Oyo State, Nigeria in partial fulfilment of the requirement for the award of
....................................... .......................................
(Supervisor)
.............................................. ..........................................
PROF. Date
(Head of Department)
DEDICATION
This project work is dedicated to the glory of Almighty God who has been my Anchor and who in His
ACKNOWLEDGEMENT
First and foremost, all appreciation goes to Almighty God for His loving kindness, protection,
provisions and mercy shown to me during my academic pursuits and for making this project a reality.
I wish to express my sincere gratitude to my able supervisor; PROF. A. ADETUNJI for his efforts and
Also, my special thanks to my caring and loving parent for their support right from the beginning of
my educational career to this present date. May you live long to eat the fruits of your labor in Jesus
name Amen.
I will not forget to thank all members of my extended family at large for their care, moral and
As digital ecosystems become increasingly intricate, the frequency and sophistication of cybersecurity
breaches pose significant threats to organizational resilience. This project addresses the imperative
need for an in-depth analysis of recent cybersecurity incidents, the identification of common
vulnerabilities, and the development of effective mitigation strategies. The project's objectives
encompass unraveling the intricacies of recent incidents, discerning recurring vulnerabilities, and
formulating actionable strategies to fortify cybersecurity defenses.
The literature review explores the historical evolution of cybersecurity breaches, providing a
contextual understanding of the current threat landscape. Incident case studies delve into specific
instances, dissecting attack methodologies, and extracting insights to inform a holistic incident
analysis. Common vulnerabilities are identified through an extensive review, categorizing weaknesses
based on prevalence, severity, and impact.
Methodologically, a mixed-methods approach is adopted, combining qualitative and quantitative
analyses. Qualitative methods include interviews and detailed case studies, while quantitative methods
leverage advanced data analysis tools to uncover patterns and trends in cybersecurity incidents.
The analysis of recent incidents involves the creation of detailed profiles, offering a comprehensive
view of attack lifecycles, impact assessments, and commonalities among diverse incidents. Patterns
and trends across incidents inform the development of targeted mitigation strategies, addressing
vulnerabilities identified through the literature review.
The proposed mitigation strategies encompass a comprehensive and adaptive approach, considering
technical, organizational, and human factors. The conclusion summarizes key findings, emphasizing
their significance in bolstering cybersecurity defenses. Implications for organizations include
proactive security measures, the cultivation of a security-aware culture, and effective responses to
emerging threats.
The project concludes by suggesting avenues for future research, recognizing the dynamic nature of
cyber threats. Future research could explore the effectiveness of the proposed mitigation strategies in
real-world scenarios, contributing to ongoing efforts to fortify cybersecurity in an ever-evolving
digital landscape.
TABLE OF CONTENTS
Certification .........................................................................................................................ii
Dedication .............................................................................................................................iii
Acknowledgement ............................................................................................................... iv
Abstract ................................................................................................................................ix-x
CHAPTER ONE
INTRODUCTION
1.3.1 OBJECTIVES
LITERATURE REVIEW
2.2.2 MISCONFIGURATIONS
SECURITY ISSUES
CHAPTER THREE
METHODOLOGY
3.1 THREATS
3.2 ATTACKS
3.3 VULNERABILITIES
Pranksters: Pranksters are least malicious computer criminals who aim to harm computer system and
financial data lost to individual or a group or an organization.
Career Criminals: Career criminals earn their income from criminal activities, while they are
dissatisfied, devotees and useless people. They work within skilful groups such as the APT17. Most of
career criminals are found in Russia, Italy, and Asia.
Cyber Bulls: Cyber bulls harass cyber users via the Internet. He/she uploads fake posts on forums,
posting fake profiles on social sites (Such as Face book, WhatsApp), sending malicious email
messages.
Industrial Spy: Industrial spy is the person who attempts to access information about future plans of
company or secrets of trade.
3.2 THREATS
Cyber security threats encompass a wide range of potentially illegal activities on internet. Cyber
security threats against utility assets have been recognized for decades. The terrorist attacks so give
the attention has been paid to the security of critical infrastructures. Insecure computer systems may
lead to fatal disruptions, disclosure of sensitive information, and frauds. Cyber threats result from
exploitation of cyber system vulnerabilities by users with unauthorized access [7]. There are crimes
that target computer networks or services directly like malware, viruses or denial of service attack and
crimes facilitated by networks or devices, the primary target of which is independent of the network or
device like fraud, identity theft, phishing scams, cyber stalking.
Cyber Theft: This is the most common cyber-attack that committed in cyberspace. This kind of
offence is normally referred as hacking in the generic sense. It basically involves using the internet
through steal information or assets. It also called the illegal access, by using the malicious script to
break or crack the computer system or network security without user knowledge or consent, for
tampering the critical data and. It is the gravest cybercrimes among the others. Most of the banks,
Microsoft, Yahoo and Amazon are victim of such cyber-attack. Cyber thieves use tactics like
plagiarism, hacking, piracy, espionage, DNS cache poisoning, and identity theft. Most of the security
web sites has described the various cyber threats.
Cyber Vandalism: Damaging or exploiting the data rather than stealing or misusing them is called
cyber vandalism. It means effect on network services are disrupted or stopped. This deprives the
authorized users for accessing the information contained on the network. This cybercrime is like a
time bomb, can be set to bring itself into action at a specified time and damage the target system. This
creation and dissemination of harmful software which do irreparable damage to computer systems,
deliberately entering malicious code like viruses, into a network to monitor, follow, disrupt, stop, or
perform any other action without the permission of the owner of the network are severe kind of
cybercrimes.
Web Jacking: Web jacking is the forceful control of a web server through gaining access and control
over the web site of another. Hackers might be manipulating the information on the site.
Stealing cards information: Stealing of credit or debit card information by stealing into the ecommerce
server and misuse this information.
Cyber Terrorism: Deliberately, usually politically motivated violence committed against civilians
through the use of, or with the help of internet.
Child Pornography: The use of computer networks to create, distribute, or access materials that
sexually exploit underage children pornography in shared drives of community networks.
Cyber Contraband: Transferring of illegal items or information through internet that is banned in some
locations, like prohibited material.
Spam: It includes the Violation of SPAM Act, through unauthorized transmission of spam by sending
illegal product marketing or immoral content proliferation via emails.
Legal accessing of network resources without altering disturbs, misuse, or damage the data or system.
It may include accessing of private information without disturbing them or snooping the network
traffic for gets some important information.
Logic bombs: These are event dependent programs. These programs are activated after the trigger of
specific even. Chernobyl virus isa specific example which acts as logic bomb and can sleep of the
particular date.
Drive by Download: A survey is undertaken by search engine companies. Numbers of websites were
acting as hosts for malware. The term “Drive by Download (DbD)” is maneuvering in software
industry since its inception with different variations. It is a phenomenon in which any software
program is installed automatically on a user computer while surfing on the internet. The intent of
installing malicious software is to gain benefit over victim machine, e.g. it could be a stealing of
confidential information like stored passwords, personal data, using victim terminal as botnet to
further spread malicious contents.
Cyber Assault by Threat: The use of a computer network such as email, videos, or phones for
threatening a person with fear for their lives or the lives of their families or persons whose safety they
are responsible for (such as employees or communities). An example of this is blackmailing a person
to a point when he is forced to transfer funds to an untraceable bank account through an online
payment facility.
Script Kiddies: Novices, who are called script kiddies, script bunny, script kitty, script running
juvenile is a derogatory term used to describe those who use scripts or programs developed by others
to attack computer systems, networks and get the root access and deface websites.
Denial of service: A denial of service attack (DoS) or distributed denial of service attack (DDoS) is an
attempt to make a computer resource unavailable to its intended users. The computer of the victim is
flooded with more requests than it can handle which cause it to crash. Although the means to carry
out, motives for, and targets of a DoS attack may vary, it generally consists of the concerted efforts of
a person or people to prevent an Internet site or service from functioning efficiently or at all,
temporarily or indefinitely. This is also known as email bombing if via used is email. E-bay, Yahoo,
Amazon suffered from this attack
3.2 ATTACKS
Cyber-attack is a big issue in the cyber world that needs to be focus because of the effect on the
critical infrastructure and data. The growth of technology is accompanied by cyber security threats or
“cyber-attacks” which threaten users security when using such technologies. Cyber threats and attacks
are difficult to identify and prevention. So users are not accepting the new technology due to the
frequently cyber-attacks less security of data. A cyber-attack is when someone gain or attempts to gain
unauthorized access to a computer maliciously [11].
UNTARGETED ATTACKS Un-targeted attacks in attackers indiscriminately target as users and
services possible. They find the vulnerabilities of the service or network. Attacker can take the
advantage of technologies like: Phishing: Phishing means fake people sending the emails to numbers
of users and asking the personal information like baking, credit card. They encouraging the visits of
fake website and give the good offers. The customers click on the links on the email to enter their
information, and so they remain unaware that the fraud has occurred. [8]. Water holing: Publish the
fake, as well as dummy website or compromising a legitimate one in order to exploit visiting user’s
information. Ransom ware: It includes spread disk encrypting extortion malware. Scanning: Attacking
wide swathes of the Internet at random.
TARGETED ATTACKS: Targeted attacks in attackers, attack on the targeted users in the cyber world.
Spear-phishing Sending links of malicious software and advertisement via emails to targeted
individuals that could contain for downloads malicious software. Deploying a botnet. It is delivering a
DDOS (Distributed Denial of Service) attack Subverting the supply chain. To attack on network or
software being delivered to the organization In general attackers will, in the first instance use tools
and techniques to probe your systems for an exploiting vulnerability of the service [3].
3.3 VULNERABILITY
Vulnerabilities are weaknesses in a system or its design that allow an intruder to execute commands,
access unauthorized data, and/or conduct denial-of service attacks. Vulnerabilities can be found in
variety of areas in the systems. They can be weaknesses in system hardware or software, weaknesses
in policies and procedures used in the systems and weaknesses of the system users themselves.
Vulnerability was identified due to hardware compatibility and interoperability and also the effort it
takes to be fixed. Software vulnerabilities can be found in operating systems, application software,
and control software like communication protocols and devices drives. There are a number of factors
that lead to software design flaws, including human factors and software complexity. Technical
vulnerabilities usually happen due to human weaknesses. [10] There is no system is automatically
immune from cyber threats, the consequences of ignoring the risks from complacency, negligence,
and incompetence are clear. In 2015, an unprecedented number of vulnerabilities were identified as
zero-day exploits that have been weaponized, and web attack exploit kits are adapting and evolving
them more quickly than ever. As more devices are connected, vulnerabilities will be exploited [14].
In 2015, lawmakers have reintroduced the “Aaron’s Law” to decline the increasing number of cyber-
attacks and threats [16]. Aaron’s Law was first introduced and sent for acceptance in 2013, but failed
to pass. The aim of lawmakers is limit the possibility of the existing antihacking act and control
prosecutorial action for assured CFAA (Computer Fraud and Abuse Act) violations. Furthermore, it is
stated that Aaron’s Law is one-step forward into the 21st Century, which cannot fix all exploiting
activities those done by cyber criminals, hackers and others. Fire Eye and Microsoft have stopped a
scheme, where malicious activities are hidden by IT pro forum of cybercriminal group known as
APT17 in China. APT17 group infects machine with the help of Black Coffee malware. This malware
uses IT forum pages and TechNet ( Microsoft product) profiles. Command-and-control server
performs malicious activities on an infected machine which are operated by online criminals. It is
simple and easy to attack a computer or machine because of this number of groups grown to choose
the legal purposes of famous websites in order to encode their command-andcontrol communications.
From this report, it is noticed that APT17 used Google and Bing to conceal their activities and host
locations in the past.
CHAPTER 5
RESULT AND DISCUSSION
5.0 Applicability of existing models
Although previous researchers discussed many models for creating security solutions, an efficient
model for preventing data breaches and cyber‐attacks is still being investigated. As reported in [3],
there are two main computational models, each with its own set of data: Net Diligence, which created
the Hub International calculator (2012) and contributed to the Verizon report, Ponemon, which created
calculators with sponsorships from Symantec (2010), Megapath (2013), and IBM (2014). However,
no critical studies of these two approaches have been conducted. In addition, I examine the claims
made by Jay Jacobs of Verizon. He collaborated with Net Diligence, and has been critical of the
computations model used by Ponemon because the Ponemon approach yields a cost per record that he
believes is too high.
The difference between the two models is readily illustrated using the average cost per record implicit
in the two approaches. The cost per record of customer personally identifiable information (PII)
increased to USD 175 in breaches caused by a malicious attack. As shown in Figure 2, the per‐record
cost of customer PII was USD 175 in malicious attacks during 2020, nearly 17% more than the overall
average per‐record cost of customer
PII (USD 162 per record) compromised in any type of breach.
PII is a value that represents the personal cost and the personal share of the breach, and it includes
records containing a customer’s personal information. The cost per record of PII increases with
malicious attacks and data breaches. In the previous work by various researchers that we studied, PII
was not determined appropriately because the existing models did not have enough relevant data.
Eighty percent of the breached organizations stated that the customer’s PII was compromised during
the breach, far more than any other type of record. As in, the average cost in 2020 has decreased, and
it is further decreasing in 2021 because of improvements in cybersecurity solutions. Costs have also
decreased because information systems in the organizations are securely maintained with all available
resources. In an organization, security risks create loss and increase the cost per record. Security risks
may come from external hackers, staff mistakes, malware or viruses, and ransomware. When a model
that does not count all proactive risk details is used, it may end up causing a huge loss to the
organization, and its data and calculations will be misleading.
By using the Ponemon formula (all costs of data breach divided by compromised records: USD 400
million/700 million records = USD 0.58), the average cost per record in the 2015 Verizon Data Beach
Investigations Report (DBIR) is USD 0.58 [23]. The magnitude difference of two to three orders of
magnitude raises several questions.
Both organizations make extensive and varied use of datasets. Pone Mon gathered information from
over 1600 business companies across several countries. Data from 191 cyber insurance payouts were
included in the Net Diligence data from the 2015 Verizon (DBIR).
I compare the cost per record with the available numbers for the Target and the Home Depot breaches,
which come out to be USD 6.30 and USD 1.13 per record, respectively. In December 2013, Target
Brands Inc. experienced a significant data breach involving 40 million credit and debit card records.
The overall cost of the data breach was reported to be about USD 252 million, based on Targetʹs
financial statements. These estimates numbers are nearer to the Net Diligence numbers. Since no
lawsuit has yet been filed, the findings are close to Hub Internationalʹs estimate (Table 1) if we deduct
the estimated lawsuit cost (USD 12.57 − 7.09 = USD 5.48). This breachʹs cost per record is not even
comparable to Ponemonʹs cost per record.
Partial Costs
4. for CC (USD) PHI and SSN (USD)
Incident investigation 1.15 1.64
Crisis management 3.52 4.57
Sanctions 0.81 0.81
Lawsuit 7.09 1.56
Total costs 12.57 8.58
The other notable example is that of the Home Depot data breach in 2014, which involved 56 million
customer payment cards [24]. The available information about the cost of this breach is given in. I
found that the cost per card was USD 63 million divided by 56 million, which equals USD 1.13. This
cost is much smaller than what the Ponemon calculators would expect, and it is actually closer to the
Hub International estimate.
There are two apparent sources of the discrepancy:
1. What is included in the data breach cost: Intangible costs, such as reputation loss and its effect
on the business loss, are included in Ponemon costs. These costs are not included in Net
Diligence. Furthermore, Net Diligence uses insurance claims as a cost measurement. The
insurance claims, it has been argued, only reflect the costs covered by the insurance purchased.
Nonetheless, the insurance coverage should be of the same order of magnitude as the actual
cost. The cost of a lost reputation can be difficult to measure. Recent attempts to calculate it
using stock price as a metric seem to indicate that the effect may be minor in several cases, and
that the effect may be masked by more important factors in stock price movement.
2. The data breach sizes: The fact that total cost is unlikely to be proportional to the number of
records involved is most likely the major contributor to the cost per record discrepancies. The
average number of records used in the Ponemon report in 2015 was 28,070, with no more than
100,000 records in total, while the Net Diligence data includes breaches involving far more
records, with the average breach involving 3,166,600 records [30]. There are two reasons for
this: some costs of data breaches are largely constant and independent of the affected records
number. As a result, for a greater number of records, the cost per record will be lower. Even if
the cost rises in tandem with the number of records, economies of scale come into play. An
organization that encounters a significant number of data breaches should be able to manage
them more cost‐effectively and receive better prices from recovery service providers.
According to a 2015 Verizon report, the average cost per record for 100 lost records was USD
254 because the expected breach cost is USD 25,445, but the cost was just USD 0.09 per
record for 100 million lost records because of the expected breach cost is USD 9 million. As a
result, cost per record alone is considered to be a misleading metric.
Our analysis of the Hub International calculator, which uses Net Diligence’s data breach cost data,
suggests that it assumes a linear trend. On the other hand, the calculators that rely on Ponemon data,
where the number of breaches does not exceed 100,000 records, the trend is not linear.
We thus propose a model that is non‐linear relative to the number of records since a linear model
implies that there is a cost per record that is meaningful
I analysis the Hub International calculator, which uses NetDiligenceʹs data breach cost data, suggests
that it assumes a linear trend. On the other hand, the calculators that rely on Ponemon data, where the
number of breaches does not exceed 100,000 records, the trend is not linear.
We thus propose a model that is non‐linear relative to the number of records since a linear model
implies that there is a cost per record that is meaningful.
Table 2. The breach cost regression models for the three datasets.
Based on the available datasets, a model of the total breach cost (y) after incorporating economy of
scale can be formulated as below:
Y ax (1)
Where a and b are applicable parameters, and size x refers to the breach sizes bigger than or equal to
1000 records. (Equation (1) is not applicable to the cases where a smaller number of records is
affected.) The cost per record (CPR) after incorporating economy of scale is obtained by dividing (1)
by the breach size, which yields,
CPR ax (2)
The two hypotheses mentioned above are both supported by the three datasets. The parameter values
in (2) should conform to how the numbers are to be interpreted.
Sample size justification is considered for existing and proposed models. Effect size has both
theoretical and practical considerations. If the effect size is not known, it can be calculated from the
mean and standard deviation values. The practical aspect of justifying the sample size is the monetary
cost and the time needed to collect the data. Nonlinearity is caused by the economy of scale; thus, b
should be <1. The size of the data breach was positively associated with a higher negative return on
the short‐term market value of the breached company. Although Tables 3–8 allow us to analyze the
justifications of the models given in (1) and (2), the average cost in 2020 is better as given in [6].
Table 3. First factor that impacts the data breach cost, required to enter the size of the breach.
Products
others
Healthca
Educatio
Financial
professio
Services:
Services
Consum
Commu
Industri
Govern
Transpo
Technol
ogyand
rtation
naland
reand
Retail
ment
All
Organization’s
er
Phaa
al
n
f
industry
IBM/ classification 219 191 184 273 169 289 174 243 267 195
182 217
Ponemon cost/record
(USD)
Probability 11 12.5 13.1 9.9 12.7 7.80 14.9 12.7 8.7 10.1
% 17.1
16.5
Custo
mer
data Customer All
includin data Student
Consumer credit excluding Employer Citizen Patient health other
Information types do data credit card records records information
your card
infor informatio data types
IBM/ n of data
employees handle mation
Ponemon
cost/record (USD) 167 243 213 250 169 195 289 210
Probability % 11.00 12.40 12.90 9.10 15.40 11.40 16.80 9.00
Table 5. The parameters a and b, the values of data breach costs, and the probabilities for the
factors associated with incident investigation cost.
(4) Data is in a
Table 6. The values of data breach costs and the probabilities for the factors associated with
crisis management cost.
Table 7. The parameters a and b for the factors associated with the cost related to regulatory and
industry sanctions.
Table 8. The parameters a and b for the factors associated with class‐
action lawsuit cost.
The total security cost is made up of two parts: the total direct cost of a data breach and the cost
of security maintenance and upgrades, which would be required even if the breach had not
occurred. These two costs participate in an organization’s expected annual security cost (3) in the
event of a security data breach. Expected annual security cost (ESC) is the addition of annual
expected cost due to breaches (EB) and cost regardless of any breaches (RB).
ESC EB RB (3)
The overall risk evaluation model, as in Figure 4 allows us to analyze the cost of the data breach
through the available data. Many risks influence the costs of a data breach, including various
types of security technologies and practices.
The expected annual cost of potential data breaches is determined by the probability of a
particular type of data breach (4). Therefore, if there are n types of data, EB is the multiplication
of the likelihood of data breach type (Pi) and the total cost per breach for type (Ai).
This team usually knows how to detect the data security risk in the organization, and it has an
emergency plan to deal with a potential breach. Therefore, the existence of this team in the
organization will reduce the data breach cost.
Where the values of a and b can be used from Table 8, quantitative assessment of cybersecurity
risks. This depends on many factors, including CALCPR. It is to be noted that SCPR cost in (7)
and CALCPR cost in (8) are calculated in a similar manner. However, parameters a and b are
chosen differently in both cases.
Cost factor FD focuses on sensitive information keeping. This factor takes into consideration the
fact that the businesses keep some information about their employees, customers, and patients
for different lengths of time. The cost of the breach will depend on the length of time this
information is retained. We determine how many months approximately are in each duration.
The durations are as follows: 3, 12, 48, 72. Then, we make 48 months as the default one. After
that, we plot the months with cost, make a trend line, and obtain the expression: y = 37 * months
+ 317. In addition, we normalize that expression by dividing all values by 2000, which is the cost
of 48 months (the default). The expression becomes: y= 0.0185 * months + 0.158. The values of
a factor are found by dividing the cost of each duration by 2000 that is the cost of 48 months.
The values are presented in (Table 13).
The cost of the data breach not only depends on the duration but also the volume of the sensitive
information that is vulnerable to a breach and which should be protected using encryption [6].
After calculation of the cost per record, the total cost due to breach for type (TB ) can be
computed by multiplication of the cost per record by the number of affected records (x) as shown
in (10):
TB CPR ∗ x (10)
The cost of protecting sensitive data in a cloud environment using policy and technology
increases with the security level and the level of the sensitive information.
The effectiveness of security processing and automation of SU on data breach costs enhance the
SM. Deployment of security levels varies with many factors; some of these factors are IP,
security tools, trust security models, etc.
CHAPTER 6
MODELING DATA BREACH PROBABILITY
The organization’s data breach probability relies on some factors: internal [vulnerabilities (if
any) that could contribute to a data breach and if they are still open, which would mean that there
is inadequate protection], external (attacker motivation and capabilities), or Bayesian (previous
breaches can indicate weaker security unless security is dramatically improved as a result of a
breach). It is worth noting that some factors that are considered by the Ponemon Institute to
influence cost can also be considered to influence likelihood, such as BCM team and data
encryption.
There are two main factors to predict the data breach probability: number of affected records,
lost or stolen, and industry classification of organizations that is considered a factor under the
classification of data types of breach. We extracted the probability data from the 2015 Ponemon
report [40]. We find that the probability is computed from the size of the data breach and from
the country as shown in (Figures 5 and 6). The expression for the probability of data breach
based on the breach size as given in (12) is based on the data points in Figure 5 using a trend line
for the data. In (12), the probability 𝑃 represents the annual data probability calculated over a
period of 12 months or a year.
P αe (12)
where, = 0.4405, = 4 × 10−5, and x is the breach size. After studying the probability of data
breach, we found that most researchers estimate the probability based on limited methods, such
as surveys and collecting experts’ opinions like the Ponemon estimation.
Some researchers do not discuss how the probability is computed.
Figure 5. Data breach probability based on the breach size (Ponemon data 2015)
Ponemon calculators (Symantec and IBM) use a survey with questions that we identify in this
paper as factors to examine the cost and probability incurred by organizations after experiencing
data breach incidents. We calculate the probability of data breaches for different periods. The
probability of a breach of data type i (P) calculates the data breach probability (13) for the
organization in the next 12 months:
𝐏𝐢 𝐅𝐂 𝐅𝐁𝐂𝐌 𝐅𝐈 𝐅𝐁𝐂 𝐅𝐄 𝐅𝐏 𝛂𝐞𝛃𝐱 (13)
−5
Where = 0.4405, = 4 × 10 , x is the breach size, and the F factors are the six factors that
impact the data breach probability. In (13), many probability factors are considered and
discussed for calculating the P in different data types. These factors are the country of the
organization that had a data breach FC, the organization’s business continuity management team
involved in the data breach incident response process FBCM, the organization’s industry
classification FI, and the most likely cause of a data breach FBC, the sensitive data encrypted on
al laptops or removable storage FE, and the organization’s privacy and availability of data
protection program FP. The factors are multiplied with the probability obtained using (12). Each
factor has a default value that is equal to one as well. Each of these factors is discussed below.
Probability Factor of Organization’s Country (FC): Like the data breach cost, the probability of a
data breach is impacted by the country where the data are located. The country‐based probability
factor data are taken from the 2015 Ponemon report [40]. We take the USA as the default choice.
Then, we use a weighted factor for the rest of the countries based on the probability for the US,
increasing each year by a small percentage (0.2%–0.3%), as presented in [6]. France and Brazil
have a relatively higher probability of a data breach.
Probability Factor of Business Continuity Management Team (FBCM): This factor is essential to
identify the potential threats faced by the organization and the impact that comes from these
threats. Therefore, this factor has a different impact based on whether or not the team is involved
in the data breach incident response plan or not. (Table 14) shows the values of the factor for
different scenarios.
CHAPTER 7
CONCLUSIONS AND FUTURE WORKS
In the age of digital cyber world, cyber and information security is an emerging field in these
days where a large number of user’s score increasing day by day where new and high equipped
cyber technologies and their services are offered by different public and private organization
which are being targeted by cyber criminals also. This paper illustrates and highlights latest
cybercrimes, criminal activists, cyber threats and attacks along with a report for the awareness of
cyber users, which may be helpful to mitigate cybercrimes, attacks/ threats. The users may be
secured from them by using and applying proposed security model and also practices of security
cyber laws and strategies. It is also noticed that appropriate education is essential for cyber users
to decrease cybercrime activities regarding cybercrime and defensive measures. In this paper,
cyber criminals have been categorized to make cyber user aware from their objectives as well as
cyber protection laws and strategies are suggested to make cyber users secure. Moreover,
research surveys using latest tools, trainings and other efficient mechanism should be adopted to
extend awareness amongst the cyber service user and also train them about their privileges and
responsibilities regarding the cyber services and information systems
There exist significant variations in how the costs of specific breaches should be computed and
how the associated risks can be estimated. In this study, we developed a systematic model for
this purpose based on available data and existing approaches. The model uses the factors that are
found to be significant. I consider the economy of scale, as observed in actual data, to develop
the model relating the cost to the number of records. We also consider the factors that may
impact the probability of a breach.
I identify several issues that need to be addressed by further research. We need to develop a
model that can estimate the costs regardless of the data breaches, such as upgrading and
maintenance costs. In addition, we need to develop more detailed approaches for estimating and
validating data breach probabilities. We did not consider the insurance payouts to cover security
breach losses or the insurance premium costs. They need to be addressed separately in detail.
The proposed model can be implemented using a suitable interface with the capability to update
the parameters as further data becomes available.
REFERENCES
Clarke, R. (2018). Cyber War: The Next Threat to National Security and What to Do About It.
HarperCollins.
Schneier, B. (2015). Data and Goliath: The Hidden Battles to Collect Your Data and Control
Your World. W. W. Norton & Company.
Dardanelli, D., & Tocci, N. (Eds.). (2017). The Schengen Information System and Border
Control Co-operation: A Transparency and Proportionality Evaluation. Springer.
Creswell, J. W., & Creswell, J. D. (2017). Research design: Qualitative, quantitative, and mixed
methods approaches. Sage publications.
Anderson, R. (2015). Security Engineering: A Guide to Building Dependable Distributed
Systems. Wiley.
Goodman, M. S. (2016). Future Crimes: Everything Is Connected, Everyone Is Vulnerable, and
What We Can Do About It. Doubleday.
National Institute of Standards and Technology. (2020). Cybersecurity Framework. Retrieved
from https://www.nist.gov/cyberframework
Verizon. (2021). Data Breach Investigations Report. Retrieved from
https://enterprise.verizon.com/resources/reports/dbir/
ISO/IEC 27001:2013. Information technology — Security techniques — Information security
management systems — Requirements.
National Institute of Standards and Technology. (2018). Framework for Improving Critical
Infrastructure Cybersecurity. Retrieved from https://www.nist.gov/cyberframework
Yin, R. K. (2018). Case study research and applications: Design and methods. Sage publications.
Miles, M. B., Huberman, A. M., & Saldana, J. (2014). Qualitative data analysis: A methods
sourcebook. Sage.