The World is Polluted With Leaked Cyber Data

The World is Polluted With Leaked Cyber Data

Ivan D. Burke, Renier P. van Heerden
Copyright: © 2017 |Volume: 7 |Issue: 4 |Pages: 17
ISSN: 1947-3435|EISSN: 1947-3443|EISBN13: 9781522514084|DOI: 10.4018/IJCWT.2017100104
Cite Article Cite Article

MLA

Burke, Ivan D., and Renier P. van Heerden. "The World is Polluted With Leaked Cyber Data." IJCWT vol.7, no.4 2017: pp.35-51. http://doi.org/10.4018/IJCWT.2017100104

APA

Burke, I. D. & van Heerden, R. P. (2017). The World is Polluted With Leaked Cyber Data. International Journal of Cyber Warfare and Terrorism (IJCWT), 7(4), 35-51. http://doi.org/10.4018/IJCWT.2017100104

Chicago

Burke, Ivan D., and Renier P. van Heerden. "The World is Polluted With Leaked Cyber Data," International Journal of Cyber Warfare and Terrorism (IJCWT) 7, no.4: 35-51. http://doi.org/10.4018/IJCWT.2017100104

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Data breaches are becoming more common and numerous every day, where huge amount of data (corporate and personal) are leaked more frequently than ever. Corporate responses to data breaches are insufficient, when commonly remediation is minimal. This research proposes that a similar approach to physical pollution (environmental pollution) can be used to map and identify data leaks as Cyber pollution. Thus, IT institutions should be made aware of their contribution to Cyber pollution in a more measurable method. This article defines the concept of cyber pollution as: security vulnerable (such as unmaintained or obsolete) devices that are visible through the Internet and corporate networks. This paper analyses the recent state of data breach disclosures Worldwide by providing statistics on significant scale data breach disclosures from 2014/01 to 2016/12. Ivan Burke and Renier van Heerden model security threat levels similar to that of pollution breaches within the physical environment. Insignificant security openings or vulnerabilities can lead to massive exploitation of entire systems. By modelling these breaches as pollution, the aim is to introduce the concept of cyber pollution. Cyber pollution is a more tangible concept for IT managers to relay to staff and senior management. Using anonymised corporate network traffic with Open Source penetration testing software, the model is validated.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.