Documente Academic
Documente Profesional
Documente Cultură
50
95 %
1,367
CONFIRMED DATA BREACHES
63,437
SECURITY INCIDENTS
95
COUNTRIES REPRESENTED
MINUTES
MONTHS
HOURS
DAYS
WEEKS
FREQUENCY
COMPROMISE
DISCOVERY
Multiple attacks
happen per second.
62% of cyber-espionage
breaches took months
to discover.
Motive
55%
Organized Crime
24%
Espionage
2%
Hacktivists
Source: Verizon Data Breach Investigations Report, 2013
Hacktivists
Industry:
Target:
Source:
Methods:
10
Espionage
Industry:
Target:
Source:
Methods:
11
Organized Crime
Industry:
Target:
Source:
Methods:
12
Credit Bureaus
BC Card, Korea
Samsung Card
NAB, Australia
Citibank, Singapore
Acquiring Bank
Issuing Bank
(Merchant Bank)
PNC
BluePay
PayPal
Merchant One
Payment Card
Processors
Commonwealth
Citibank
Agricultural Bank of China
(Consumer Bank)
SquareTwo
Euler Hermes
Atradius
Collection Agency
7-Eleven
Woolworths
Lotte
Merchant
Card Holder
(Consumer)
13
Anatomy of a Breach
Millions of consumers effected
Attacker phishes third
party contractor
PERIMETER
14
Stolen Credentials
phishes privileged
Steals privileged user
1. Attacker
2.
employee or contractor
credentials
credentials to access
3. Uses
sensitive data, hiding
under radar
19
communicates
3. Injection
through to database and
vulnerability
Name:
reads/writes to data
Address:
Phone:
20
0%
Data breaches detected by antivirus programs or intrusion
detection systems
21
50%
76%
85%
80%
MALWARE
PROPOGATE BY
MISCONFIGURATION
OF ORGANIZATIONS
TAKE 6 MONTHS+
TO PATCH DBs
ATTACKS
TAKE 5 MINUTES OR
LESS
TARGET
WEAK PASSWORDS
VDBIR 2014
IOUG 2013
VDIR 2014
VDIR 2014
Copyright 2014, Oracle and/or its affiliates. All rights reserved. | Oracle Confidential Internal
22
Quality of
Service
Risk
Mitigation
Audit
Controls
Discover
Classify
Risk
Analysis
approach
that aligns with business
requirements and
automates controls.
Establishes ongoing
23
DEFENSE
IN-DEPTH
SECURITY
INSIDE
OUT
SECURE
WHATS
STRATEGIC
24