Difference between revisions of "The Defenders: Proposal Version 1"
Line 14: | Line 14: | ||
<div style="margin-top:10px"> | <div style="margin-top:10px"> | ||
− | [[File:Intro Motivation and Objectives.png|center| | + | [[File:Intro Motivation and Objectives.png|center|1000px]] |
<div style="background: #FFFFFF; margin-top: 40px; font-weight: bold; line-height: 0.3em;letter-spacing:-0.08em;font-size:20px"><font color=#FF6347 face="Helvetica">SELECTED DATASET</font></div> | <div style="background: #FFFFFF; margin-top: 40px; font-weight: bold; line-height: 0.3em;letter-spacing:-0.08em;font-size:20px"><font color=#FF6347 face="Helvetica">SELECTED DATASET</font></div> | ||
− | {| class="wikitable" | + | {| class="wikitable" style="position: center;" |
|- | |- | ||
− | ! Breach Level Index | + | ! 1.Breach Level Index |
|- | |- | ||
− | | Source : Gemalto, the world leader in digital security. | + | | Source : Gemalto, the world leader in digital security. |
|- | |- | ||
− | | Purpose : Dataset is designed to provide a simple way to input publicly disclosed information on data breaches and calculate a score indicating breach severity. (https://breachlevelindex.com/) | + | | Purpose : Dataset is designed to provide a simple way to input publicly disclosed information on data breaches and calculate a score indicating breach severity. (https://breachlevelindex.com/) |
|- | |- | ||
| | | | ||
Line 58: | Line 58: | ||
Log 10 ( Type of Data * Source of Breach * Whether Action was taken) | Log 10 ( Type of Data * Source of Breach * Whether Action was taken) | ||
− | + | ||
+ | |||
|} | |} | ||
+ | {| class="wikitable" style="position: center;" | ||
+ | |- | ||
+ | ! 2. The world bank !! 3. Percentage of Individual using the internet !! 4. Human Development Reports | ||
+ | |- | ||
+ | | Source: The World Bank Group’s (WBG) Fragile, Conflict and Violence Group (formally the Center on Conflict, Security and Development CCSD) annually releases the Harmonized List of Fragile Situations. | ||
+ | || | ||
+ | Source: World bank group | ||
+ | || | ||
+ | Source: Barro-Lee Educational Attainment Dataset | ||
+ | |- | ||
+ | | Purpose: Stronger collaboration with humanitarian, development, peace and security partners is critical for delivery in challenging environments, such as in the Bank’s response to famine. | ||
+ | || | ||
+ | Purpose: Overview of Internet Penetration to date (http://www.worldbank.org/) | ||
+ | || | ||
+ | Purpose: Serves as a measure of achievement in the basic dimensions of human development across countries. (http://www.hdr.undp.org/en) | ||
+ | |- | ||
+ | | | ||
+ | |||
+ | 1. Year | ||
+ | |||
+ | 2. Conflict and Unrest | ||
+ | || | ||
+ | |||
+ | 1. Year | ||
+ | |||
+ | 2. Individuals using the Internet (% of population) | ||
+ | |||
+ | || | ||
+ | |||
+ | 1. Literacy rate | ||
+ | |||
+ | 2. Government expenditure on education (% of total expenditure) | ||
+ | |||
+ | 3. Gross domestic product : | ||
+ | |||
+ | Monetary measure of the market value of all the final goods and services | ||
+ | produced in a period of time, often annually or quarterly. | ||
+ | |||
+ | 4. Employment OR unemployment | ||
+ | |} | ||
<p> | <p> | ||
Revision as of 00:18, 13 October 2018
1.Breach Level Index |
---|
Source : Gemalto, the world leader in digital security. |
Purpose : Dataset is designed to provide a simple way to input publicly disclosed information on data breaches and calculate a score indicating breach severity. (https://breachlevelindex.com/) |
1. Organization Breached 2. Number of Records Breached 3. Date of Breach: 01/01/2013 - 29/06/2018 4. Type of Breach -Nuisance (Email, Addresses, Affiliation) -Account Access (Username, Passwords to websites/ social media) -Financial Access (Bank Account Credentials) -Identity Theft ( Information can be used to masquerade someone) -Existential Data ( Info can be used to threaten business survival) 5. Source of Breach: -Lost Device -Stolen Device -Malicious Insider -Malicious Outsider -State Espionage 6. Location: Country 7. Industry: -Technology, Other, Retail, Government, Healthcare, Education -Financial, Social Media, Hospitality, Entertainment, Insurance -Non-profit, Industrial, Professional Services 8. Risk Score: Log 10 ( Type of Data * Source of Breach * Whether Action was taken)
|
2. The world bank | 3. Percentage of Individual using the internet | 4. Human Development Reports |
---|---|---|
Source: The World Bank Group’s (WBG) Fragile, Conflict and Violence Group (formally the Center on Conflict, Security and Development CCSD) annually releases the Harmonized List of Fragile Situations. |
Source: World bank group |
Source: Barro-Lee Educational Attainment Dataset |
Purpose: Stronger collaboration with humanitarian, development, peace and security partners is critical for delivery in challenging environments, such as in the Bank’s response to famine. |
Purpose: Overview of Internet Penetration to date (http://www.worldbank.org/) |
Purpose: Serves as a measure of achievement in the basic dimensions of human development across countries. (http://www.hdr.undp.org/en) |
1. Year 2. Conflict and Unrest |
1. Year 2. Individuals using the Internet (% of population) |
1. Literacy rate 2. Government expenditure on education (% of total expenditure) 3. Gross domestic product : Monetary measure of the market value of all the final goods and services produced in a period of time, often annually or quarterly. 4. Employment OR unemployment |
Related Works | What We Can Learn |
---|---|
|
|
Sketches | How Analyst Can Conduct Analysis |
---|---|
|
|
|
Feel free to comments, suggestions and feedbacks to help us improve our project!:D