What is it about?

We present an in-depth analysis of 10 famous data breaches of the past to explain how attackers steal data in real-life. Additionally we analyze 50 data breaches from 2015 to generalize the attack methods and workflows. We further study current security defense mechanisms and highlight their gaps.

Featured Image

Read the Original

This page is a summary of: SoK: Anatomy of Data Breaches, Proceedings on Privacy Enhancing Technologies, October 2020, De Gruyter,
DOI: 10.2478/popets-2020-0067.
You can read the full text:

Read

Resources

Contributors

The following have contributed to this page