Nine Classification Patterns from the Verizon 2014 Data Breach Investigations Report

3,619 views

Published on

Explore stats and facts from recent incidents, and see how the nine classifications of attacks affect major industries. Download the full report here: http://vz.to/DBIR2014

Published in: Technology
0 Comments
9 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
3,619
On SlideShare
0
From Embeds
0
Number of Embeds
448
Actions
Shares
0
Downloads
112
Comments
0
Likes
9
Embeds 0
No embeds

No notes for slide

Nine Classification Patterns from the Verizon 2014 Data Breach Investigations Report

  1. 1. Hotel BANK BANK Energy/Utilities Just two patterns—web app attacksandcrimeware—covered 69% of all incidents. Public Sector The most frequent incidents were errors (34%), insider misuse (24%), crimeware (21%) and lost/stolen assets (19%). Healthcare Physical theft and loss of assets occurred most often in the office—not from personal vehicles or homes. Travel/Hospitality Three-quarters of the attacks targeted POS devices and systems—a good argument for PCI compliance. RETAIL of all security incidents we analyzed over a ten-year period fit into nine basic patterns. 92% Web app attacks were responsible for the highest number of incidents. 38% DOS attacks were most frequent, followed by point-of-sale intrusions (31%). 33% Most attacks came from point-of-sale intrusions—highest for all industries. 75% Combined number of attacks from cyber-espionage and DOS. 54% Number of incidents attributed to DOS attacks. 37% Just four patterns accounted for almost all attacks. 98% of security incidents were the result of lost or stolen assets. 46% FINANCIAL SERVICES MANUFACTURING PROFESSIONALSERVICES ENERGY AND UTILITIES PUBLICSECTOR HEALTHCARE TRAVEL AND HOSPITALITY The majority of incidents came from web app attacks, DOS, and card skimming. 75% Data Breach InvestigationsReport2014 Conducted by Verizon with contributions from 50 organizations from around the world. Everything Else Point-of-Sale Intrusions Cyber-Espionage Web Application Attacks Insider Misuse Crimeware Miscellaneous Errors Card Skimmers Physical Theft/Loss Denial of Service Attacks © 2014 Verizon. All Rights Reserved. The Verizon name and logo and all other names, logos, and slogans identifying Verizon’s products and services are trademarks and service marks or registered trademarks and service marks of Verizon Trademark Services LLC or its affiliates in the United States and/or other countries. All other trademarks and service marks are the property of their respective owners. MC15923 04/14 Nineclassificationpatterns covered the majority of security incidents. In 2013, we analyzed over 63,000 security incidents and more than 1,300 confirmed breaches to provide new insight into your biggest threats and to help improve your defenses against them.Thisyear’sreport identifies nine basic patterns that covered 92% of all the 100,000 security incidents we’ve looked at from the past 10 years. Download the Verizon 2014 Data Breach Investigations Report today. verizonenterprise.com/DBIR/2014verizonenterprise.com/DBIR/2014

×