Understanding Data Breach from a Global Perspective: Incident Visualization and Data Protection Law Review

被引:2
|
作者
Rodrigues, Gabriel Arquelau Pimenta [1 ]
Serrano, Andre Luiz Marques [1 ]
Lemos, Amanda Nunes Lopes Espineira [2 ,3 ]
Canedo, Edna Dias [1 ]
de Mendonca, Fabio Lucio Lopes [1 ]
Albuquerque, Robson de Oliveira [1 ,4 ]
Orozco, Ana Lucila Sandoval [1 ,4 ]
Villalba, Luis Javier Garcia [4 ]
机构
[1] Univ Brasilia UnB, Dept Elect Engn ENE, Profess Postgrad Program Elect Engn PPEE, BR-70910900 Brasilia, Brazil
[2] Univ Brasilia UnB, Law Sch, Grad Program Law PPGD, BR-70910900 Brasilia, Brazil
[3] Univ Minho EDUM, Sch Law, Campus Gualtar, P-4710057 Braga, Portugal
[4] Univ Complutense Madrid UCM, Fac Comp Sci & Engn, Dept Software Engn & Artificial Intelligence DISIA, Grp Anal Secur & Syst GASS,Off 431, Calle Prof Jose Garcia Santesmase 9,Ciudad Univ, Madrid 28040, Spain
关键词
compliance; data breach; data protection regulation; information security; privacy; CHALLENGES; SECURITY; INTELLIGENCE; INFORMATION; PRIVACY; TRENDS; IOT;
D O I
10.3390/data9020027
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data breaches result in data loss, including personal, health, and financial information that are crucial, sensitive, and private. The breach is a security incident in which personal and sensitive data are exposed to unauthorized individuals, with the potential to incur several privacy concerns. As an example, the French newspaper Le Figaro breached approximately 7.4 billion records that included full names, passwords, and e-mail and physical addresses. To reduce the likelihood and impact of such breaches, it is fundamental to strengthen the security efforts against this type of incident and, for that, it is first necessary to identify patterns of its occurrence, primarily related to the number of data records leaked, the affected geographical region, and its regulatory aspects. To advance the discussion in this regard, we study a dataset comprising 428 worldwide data breaches between 2018 and 2019, providing a visualization of the related statistics, such as the most affected countries, the predominant economic sector targeted in different countries, and the median number of records leaked per incident in different countries, regions, and sectors. We then discuss the data protection regulation in effect in each country comprised in the dataset, correlating key elements of the legislation with the statistical findings. As a result, we have identified an extensive disclosure of medical records in India and government data in Brazil in the time range. Based on the analysis and visualization, we find some interesting insights that researchers seldom focus on before, and it is apparent that the real dangers of data leaks are beyond the ordinary imagination. Finally, this paper contributes to the discussion regarding data protection laws and compliance regarding data breaches, supporting, for example, the decision process of data storage location in the cloud.
引用
收藏
页数:24
相关论文
共 50 条
  • [21] Organizational Data Breach: Building Conscious Care Behavior in Incident Response
    Teoh, Adlyn Adam
    Ghani, Norjihan Binti Abdul
    Ahmad, Muneer
    Jhanjhi, Nz
    Alzain, Mohammed A.
    Masud, Mehedi
    [J]. COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2022, 40 (02): : 505 - 515
  • [22] DBIM: An Efficient and Resilient PII Data Breach Incident Management System
    Fugkeaw, Somchart
    Kuasomboon, Nichakorn
    Panakitkul, Pathitta
    [J]. 2021 13TH INTERNATIONAL CONFERENCE ON KNOWLEDGE AND SMART TECHNOLOGY (KST-2021), 2021, : 237 - 242
  • [23] A new data protection law
    Rallo Lombarte, Artemi
    [J]. REVISTA ESPANOLA DE DERECHO CONSTITUCIONAL, 2019, 39 (116): : 45 - 74
  • [24] EUROPEAN DATA PROTECTION LAW
    EVANS, AC
    [J]. AMERICAN JOURNAL OF COMPARATIVE LAW, 1981, 29 (04): : 571 - 582
  • [25] Vulnerability and Data Protection Law
    Infantino, Marta
    [J]. EUROPEAN REVIEW OF PRIVATE LAW, 2023, 31 (06): : 1311 - 1318
  • [26] DATA PROTECTION AND LAW REFORM
    KIRBY, MD
    [J]. COMPUTER NETWORKS AND ISDN SYSTEMS, 1979, 3 (03): : 149 - 163
  • [27] Predictions from data analytics: Does Malaysian data protection law apply?
    San, Tay Pek
    [J]. INFORMATION & COMMUNICATIONS TECHNOLOGY LAW, 2020, 29 (03) : 291 - 307
  • [28] Understanding Data Visualization Design Practice
    Parsons, Paul
    [J]. IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS, 2022, 28 (01) : 665 - 675
  • [29] DATA PROTECTION AFTER FEDERAL DATA PROTECTION LAW GOES INTO EFFECT
    STEINMEYER, R
    [J]. POLITISCHE STUDIEN, 1978, 29 (241) : 528 - 537
  • [30] From data breach to information stewardship
    Small, Mike
    [J]. Network Security, 2013, 2013 (10) : 5 - 8