IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

The World is Polluted With Leaked Cyber Data

The World is Polluted With Leaked Cyber Data
View Sample PDF
Author(s): Ivan D. Burke (University of Pretoria, South Africa & Rhodes University, South Africa)and Renier P. van Heerden (University of Pretoria, South Africa & Nelson Mandela University, South Africa)
Copyright: 2019
Pages: 17
Source title: National Security: Breakthroughs in Research and Practice
Source Author(s)/Editor(s): Information Resources Management Association (USA)
DOI: 10.4018/978-1-5225-7912-0.ch024

Purchase

View The World is Polluted With Leaked Cyber Data on the publisher's website for pricing and purchasing information.

Abstract

Data breaches are becoming more common and numerous every day, where huge amount of data (corporate and personal) are leaked more frequently than ever. Corporate responses to data breaches are insufficient, when commonly remediation is minimal. This research proposes that a similar approach to physical pollution (environmental pollution) can be used to map and identify data leaks as Cyber pollution. Thus, IT institutions should be made aware of their contribution to Cyber pollution in a more measurable method. This article defines the concept of cyber pollution as: security vulnerable (such as unmaintained or obsolete) devices that are visible through the Internet and corporate networks. This paper analyses the recent state of data breach disclosures Worldwide by providing statistics on significant scale data breach disclosures from 2014/01 to 2016/12. Ivan Burke and Renier van Heerden model security threat levels similar to that of pollution breaches within the physical environment. Insignificant security openings or vulnerabilities can lead to massive exploitation of entire systems. By modelling these breaches as pollution, the aim is to introduce the concept of cyber pollution. Cyber pollution is a more tangible concept for IT managers to relay to staff and senior management. Using anonymised corporate network traffic with Open Source penetration testing software, the model is validated.

Related Content

Guru Prasad M. S., Praveen Gujjar, H. N. Naveen Kumar, M. Anand Kumar, S. Chandrappa. © 2023. 14 pages.
Bhawnesh Kumar, Ashwani Kumar, Harendra Singh Negi, Javed Alam. © 2023. 15 pages.
Abhishek Kumar, Karan Singh. © 2023. 21 pages.
Anuj Singh, Somjit Mandal, Kamlesh Chandra Purohit. © 2023. 21 pages.
Muthumanikandan Vanamoorthy. © 2023. 13 pages.
Janmejay Pant, Rakesh Kumar Sharma, Himanshu Pant, Devendra Singh, Durgesh Pant. © 2023. 11 pages.
Siddhardha Kollabathini. © 2023. 9 pages.
Body Bottom