Your SlideShare is downloading. ×
0
Verizon’s 2014 Data Breach Investigations Report Identifies Nine Attack Patterns - Part 1 of 3
Verizon’s 2014 Data Breach Investigations Report Identifies Nine Attack Patterns - Part 1 of 3
Verizon’s 2014 Data Breach Investigations Report Identifies Nine Attack Patterns - Part 1 of 3
Verizon’s 2014 Data Breach Investigations Report Identifies Nine Attack Patterns - Part 1 of 3
Verizon’s 2014 Data Breach Investigations Report Identifies Nine Attack Patterns - Part 1 of 3
Verizon’s 2014 Data Breach Investigations Report Identifies Nine Attack Patterns - Part 1 of 3
Verizon’s 2014 Data Breach Investigations Report Identifies Nine Attack Patterns - Part 1 of 3
Verizon’s 2014 Data Breach Investigations Report Identifies Nine Attack Patterns - Part 1 of 3
Verizon’s 2014 Data Breach Investigations Report Identifies Nine Attack Patterns - Part 1 of 3
Verizon’s 2014 Data Breach Investigations Report Identifies Nine Attack Patterns - Part 1 of 3
Verizon’s 2014 Data Breach Investigations Report Identifies Nine Attack Patterns - Part 1 of 3
Verizon’s 2014 Data Breach Investigations Report Identifies Nine Attack Patterns - Part 1 of 3
Verizon’s 2014 Data Breach Investigations Report Identifies Nine Attack Patterns - Part 1 of 3
Verizon’s 2014 Data Breach Investigations Report Identifies Nine Attack Patterns - Part 1 of 3
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Verizon’s 2014 Data Breach Investigations Report Identifies Nine Attack Patterns - Part 1 of 3

33,032

Published on

Learn insightful details about the findings from Verizon’s 2014 Data Breach Investigations Report. Verizon’s security researchers, using advanced analytical techniques, found that 92 percent of the …

Learn insightful details about the findings from Verizon’s 2014 Data Breach Investigations Report. Verizon’s security researchers, using advanced analytical techniques, found that 92 percent of the 100,000 security incidents analyzed over the past ten years can be traced to nine (9) basic attack patterns that vary from industry to industry. This SlideShare identifies the nine attack patterns and how prevalent they are by industry. Learn more in future SlideShares within this series about how to protect your enterprise from these nine attack patterns and which attacks are most prevalent by industry. Download the full report here: http://vz.to/DBIR2014 View part two of three in this series here: http://www.slideshare.net/VerizonEnterpriseSolutions/2014-dbir-how-to-best-defend-against-nine-attack-patterns-part-2-of-3

Published in: Internet, Business, Technology
2 Comments
44 Likes
Statistics
Notes
No Downloads
Views
Total Views
33,032
On Slideshare
0
From Embeds
0
Number of Embeds
19
Actions
Shares
0
Downloads
365
Comments
2
Likes
44
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. 1Confidentialand proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement. 2014 DATA BREACH INVESTIGATIONS REPORT 92THE UNIVERSE OF THREATS MAY SEEM LIMITLESS, BUT 92% OF THE 100,000 INCIDENTS WE’VE ANALYZED FROM THE LAST 10 YEARS CAN BE DESCRIBED BY JUST NINE BASIC PATERNS. Conducted by Verizon with contributions from 50 organizations from around the world. POINT-OF-SALE INTRUSIONS WEB-APP ATTACKS PAYMENT CARD SKIMMERS CRIMEWAR E DOS ATTACKS INSIDER MISUSE PHYSICAL THEFT AND LOSS CYBER-ESPIONAGE % MISCELLANEOUS ERRORS
  • 2. Confidentialand proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement. 2 92% of security incidents can be described by just nine patterns* * Based on analysis of over 100,000 incidents from between 2004 and 2013
  • 3. Confidentialand proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement. 3 And when you look at a single industry, on average 72% of the threats can be described by just three patterns. 72% in Energy and utilities in Public sector in Healthcare in Travel and hospitality in Retail in Professional services in Manufacturing in Financial services 83% 79% 73% 55% 74% 75% 68% 75% The Industry View
  • 4. Confidentialand proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement. 4 85% OF POS INTRUSIONS TOOK WEEKS TO BE DISCOVERED. What is it? When attackers compromise the computers and servers that run point of sale (POS) applications, with the intention of capturing payment data. Is my industry a target? Hospitality and retail companies are the top targets, but other sectors, such as healthcare, are also at risk. POS Intrusions
  • 5. Confidentialand proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement. 5 WEB APP ATTACKS OFTEN TARGET CMS LIKE DRUPAL AND WORDPRESS. What is it? When attackers use stolen credentials or exploit vulnerabilities in web applications — such as content management systems (CMS) or e-commerce platforms. Is my industry a target? Most sectors now have many of their applications web-facing, but top targets included information, utility, manufacturing and retail companies. Web App Attacks
  • 6. Confidentialand proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement. 6 OF MISUSE ATTACKS HAPPENED ACROSS THE CORPORATE LAN. 85% What is it? When employees (or ex-employees) with access rights use their privileges to access data, either in person or over the network. Is my industry a target? A wide range of industries were represented: real estate; public sector; mining; administrative and others. Insider Misuse
  • 7. Confidentialand proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement. 7 OF ALL THEFT/LOSS HAPPENED IN THE WORK AREA. 43% What is it? The loss or theft of laptops, USB keys, printed papers and other information assets, mostly from offices, but also from vehicles and homes. Is my industry a target? Accidents happen anywhere — but 45% of all incidents in the healthcare sector fit this profile. Public sector was also a big contributor. Physical Theft and Loss
  • 8. Confidentialand proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement. 8 What is it? Any mistake that compromises security, such as accidentally posting private data to a public site, or failing to dispose of documents or assets securely. Is my industry a target? Industries that communicate with the public — such as public sector, administration, education and healthcare — suffer most. Miscellaneous Errors OF ERRORS INVOLVED PRINTED DOCUMENTS. 49%
  • 9. Confidentialand proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement. 9 THE MAJORITY OF CRIMEWARE INCIDENTS START VIA WEB ACTIVITY, NOT LINKS OR ATTACHMENTS IN EMAIL. What is it? Any use of malware (often web-based) to compromise systems such as servers and desktops. This pattern includes phishing. Is my industry a target? We found public sector, information, utilities, and manufacturing were most at risk. Crimeware
  • 10. Confidentialand proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement. 10 86% OF SKIMMING ATTACKS WERE ON ATMS. What is it? The physical installation of a “skimmer” on an ATM, forecourt gas pump or POS terminal, to read your card data as you pay. Is my industry a target? Banks and retailers are the primary targets, but anybody that processes card “cardholder present” transaction is vulnerable — like healthcare providers. Payment Card Skimmers
  • 11. Confidentialand proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement. 11 +115% MORE POWERFUL BOTNETS AND REFLECTION ATTACKS HAVE HELPED DRIVE THE SCALE OF DOS ATTACKS UP 115% SINCE 2011. What is it? Attackers use “botnets” of PCs and powerful servers to overwhelm an organization’s systems and applications with malicious traffic, causing normal business to grind to a halt. Is my industry a target? Attacks are often on mission-critical transactional systems in finance, retail and similar sectors. Denial of Service
  • 12. Confidentialand proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement. 12 3x THIS YEAR’S DATA SET SHOWS A THREEFOLD INCREASE IN ESPIONAGE ATTACKS YEAR ON YEAR. What is it? When state-affiliated actors breach an organization, often via targeted phishing attacks, and after intellectual property. Is my industry a target? Not just a problem for government and military organizations, but professional, manufacturing, mining, transportation and public sector are all popular targets. Cyber-espionage
  • 13. Confidentialand proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement. 13 POS Intrusions = 1% Crimeware = 19% Web App Attacks = 8% Card Skimmers = 1% Insider Misuse = 19% DoS Attacks = 2% Physical Theft/Loss = 16% Cyber-espionage = 1% Misc. Errors = 27% Everything Else = 8% Based on analysis of over 100,000 incidents from between 2004 and 2013 Share of Incidents, All Industries
  • 14. Confidentialand proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement. 14 To download the full report, the executive summary, infographic, and other DBIR materials, please visit http://vz.to/DBIR2014. Learn More

×