Best Security Measures to Reduce Cyber-Incident and Data Breach Risks

被引:0
|
作者
Kikuchi, Hiroaki [1 ,3 ]
Yamada, Michihiro [2 ]
Ikegami, Kazuki [2 ]
Inui, Koji [1 ]
机构
[1] Meiji Univ, Sch Interdisciplinary Math Sci, Tokyo, Japan
[2] Meiji Univ, Grad Sch Adv Math Sci, Chiyoda Ku, 4-21-1 Nakano, Tokyo 1648525, Japan
[3] RIKEN, Ctr Adv Intelligence Project AIP, Tokyo, Japan
关键词
D O I
10.1007/978-3-030-93944-1_1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Corporations plan to adopt appropriate combinations of data privacy managements to mitigate the risk of data breach. Examples of such well-established measures include the certification of an information security management system, a periodic security auditing, and dedicated positions such as a Chief Information Officer (CIO). However, the effectiveness of introducing each of these measures to reduce the risk of data breach is unclear. To assess the effective risk reduction, this work combines the big data of cyber incidents with the attributes of corporations and computes the relative risk with respect to these security measures. Our analysis of five-year data from about 6,000 corporations reveals a negative effect for most measures. The results must be biased by industry characteristics associated with the risk of cyber incidents such as business style and company scale, which are known confounding factors. After investigating company attributes individually, we identify the significant confounding factors that represent obstacles to risk analysis. Using hypothesis testing and multiple logistic regression analysis, we adjust odds ratios for 17 security measures, social responsibilities, environmental conditions, and employment arrangements. The results confirm that an environmental auditing reduces the risk by one-third at a statistically significant level.
引用
收藏
页码:3 / 19
页数:17
相关论文
共 14 条
  • [1] Addressing insurance of data breach cyber risks in the catastrophe framework
    Spencer Wheatley
    Annette Hofmann
    Didier Sornette
    [J]. The Geneva Papers on Risk and Insurance - Issues and Practice, 2021, 46 : 53 - 78
  • [2] Addressing insurance of data breach cyber risks in the catastrophe framework
    Wheatley, Spencer
    Hofmann, Annette
    Sornette, Didier
    [J]. GENEVA PAPERS ON RISK AND INSURANCE-ISSUES AND PRACTICE, 2021, 46 (01): : 53 - 78
  • [3] Before the Breach: The Role of Cyber Insurance in Incentivizing Data Security
    Heath, Brendan
    [J]. GEORGE WASHINGTON LAW REVIEW, 2018, 86 (04) : 1115 - 1151
  • [4] System of measures to reduce risks and reduce the risks of disasters in order to increase economic security
    Puchkov, Vladimir A.
    [J]. NAUKA I TEHNOLOGII TRUBOPROVODNOGO TRANSPORTA NEFTI I NEFTEPRODUKTOV-SCIENCE & TECHNOLOGIES-OIL AND OIL PRODUCTS PIPELINE TRANSPORTATION, 2020, 10 (02): : 210 - 218
  • [5] Three cyber-security strategies to mitigate the impact of a data breach
    Densham, Ben
    [J]. Network Security, 2015, 2015 (01) : 5 - 8
  • [6] Analysis and Parsing of Unstructured Cyber-Security Incident Data
    Ochoa, Armando J.
    Finlayson, Mark A.
    [J]. PROCEEDINGS OF THE 2019 CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC '19), 2019, : 345 - 346
  • [7] A FRAMEWORK FOR EVALUATION OF CYBER SECURITY RISKS USING MONITORING DATA
    Lieuwen, Timothy
    Perullo, Christopher
    Kee, Jared
    [J]. PROCEEDINGS OF ASME TURBO EXPO 2023: TURBOMACHINERY TECHNICAL CONFERENCE AND EXPOSITION, GT2023, VOL 6, 2023,
  • [8] Forensic Profiling of Cyber-Security Adversaries based on Incident Similarity Measures Interaction Index
    Kebande, Victor R.
    Karie, Nickson M.
    Wario, Ruth D.
    Venter, H. S.
    [J]. 2018 INTERNATIONAL CONFERENCE ON INTELLIGENT AND INNOVATIVE COMPUTING APPLICATIONS (ICONIC), 2018, : 444 - 449
  • [9] IoT and Smart Home Data Breach Risks from the Perspective of Data Protection and Information Security Law
    Vojkovic, Goran
    Milenkovic, Melita
    Katulic, Tihomir
    [J]. BUSINESS SYSTEMS RESEARCH JOURNAL, 2020, 11 (03): : 167 - 185
  • [10] A review of cyber security risks of power systems: from static to dynamic false data attacks
    Xu, Yan
    [J]. PROTECTION AND CONTROL OF MODERN POWER SYSTEMS, 2020, 5 (01)