A Foundation for Breach Data Analysis

Adewale O Adebayo


Analysis of breach data would provide fresh insight into the subject of Information Security. There is, therefore the need to examine breach data repositories on which the analyses would be based. This work set to identify and describe breach data repositories, and highlight whatever is revealed. The use of Datalossdb.org data set as a base to be enriched for open verifiable analysis of the breach data was supported, and the necessity of a common vocabulary for describing security breach related issues was revealed.

Keywords: data breach, breach data, breach data database, breach data repository, breach data reports

Full Text: PDF
Download the IISTE publication guideline!

To list your conference here. Please contact the administrator of this platform.

Paper submission email: JIEA@iiste.org
ISSN (Paper)2224-5782 ISSN (Online)2225-0506
Please add our address "contact@iiste.org" into your email contact list.
This journal follows ISO 9001 management standard and licensed under a Creative Commons Attribution 3.0 License.
Copyright © www.iiste.org