Difference between revisions of "The Defenders: Proposal Version 1"
Jump to navigation
Jump to search
Line 17: | Line 17: | ||
<div style="background: #FFFFFF; margin-top: 40px; font-weight: bold; line-height: 0.3em;letter-spacing:-0.08em;font-size:20px"><font color=#FF6347 face="Helvetica">SELECTED DATASET</font></div> | <div style="background: #FFFFFF; margin-top: 40px; font-weight: bold; line-height: 0.3em;letter-spacing:-0.08em;font-size:20px"><font color=#FF6347 face="Helvetica">SELECTED DATASET</font></div> | ||
− | {| class="wikitable" | + | {| class="wikitable" |
− | |||
− | |||
|- | |- | ||
− | | | + | ! Breach Level Index !! Header text |
− | + | |- | |
− | | | + | | Source : Gemalto, the world leader in digital security. || Example |
− | |||
|- | |- | ||
− | | | + | | Purpose : Dataset is designed to provide a simple way to input publicly disclosed information on data breaches and calculate a score indicating breach severity. (https://breachlevelindex.com/) || Example |
− | |||
− | | | ||
− | |||
|- | |- | ||
− | | | + | | |
+ | 1. Organization Breached | ||
− | + | 2. Number of Records Breached | |
− | + | 3. Date of Breach: | |
− | + | 01/01/2013 - 29/06/2018 | |
− | + | 4. Type of Breach | |
+ | -Nuisance (Email, Addresses, Affiliation) | ||
+ | -Account Access (Username, Passwords to websites/ social media) | ||
+ | -Financial Access (Bank Account Credentials) | ||
+ | -Identity Theft ( Information can be used to masquerade someone) | ||
+ | -Existential Data ( Info can be used to threaten business survival) | ||
− | + | 5. Source of Breach: | |
− | + | -Lost Device | |
+ | -Stolen Device | ||
+ | -Malicious Insider | ||
+ | -Malicious Outsider | ||
+ | -State Espionage | ||
− | + | 6. Location: Country | |
− | + | 7. Industry: | |
− | + | -Technology, Other, Retail, Government, Healthcare, Education | |
+ | -Financial, Social Media, Hospitality, Entertainment, Insurance | ||
+ | -Non-profit, Industrial, Professional Services | ||
− | + | 8. Risk Score: | |
+ | Log 10 ( Type of Data * Source of Breach * Whether Action was taken) | ||
+ | || Example | ||
|} | |} | ||
− | |||
<p> | <p> |
Revision as of 16:33, 11 October 2018
SELECTED DATASET
Breach Level Index | Header text |
---|---|
Source : Gemalto, the world leader in digital security. | Example |
Purpose : Dataset is designed to provide a simple way to input publicly disclosed information on data breaches and calculate a score indicating breach severity. (https://breachlevelindex.com/) | Example |
1. Organization Breached 2. Number of Records Breached 3. Date of Breach: 01/01/2013 - 29/06/2018 4. Type of Breach -Nuisance (Email, Addresses, Affiliation) -Account Access (Username, Passwords to websites/ social media) -Financial Access (Bank Account Credentials) -Identity Theft ( Information can be used to masquerade someone) -Existential Data ( Info can be used to threaten business survival) 5. Source of Breach: -Lost Device -Stolen Device -Malicious Insider -Malicious Outsider -State Espionage 6. Location: Country 7. Industry: -Technology, Other, Retail, Government, Healthcare, Education -Financial, Social Media, Hospitality, Entertainment, Insurance -Non-profit, Industrial, Professional Services 8. Risk Score: Log 10 ( Type of Data * Source of Breach * Whether Action was taken) |
Example |
BACKGROUND SURVEY OF RELATED WORKS
Related Works | What We Can Learn |
---|---|
|
|
SKETCHES STORYBOARD
Sketches | How Analyst Can Conduct Analysis |
---|---|
|
|
|
ARCHITECTURE DIAGRAM
KEY TECHNICAL CHALLENGES
PROJECT TIMELINE
REFERENCES
COMMENTS
Feel free to comments, suggestions and feedbacks to help us improve our project!:D