Adams, A., & Sasse, M. A. (1999). Users are not the enemy. Communications of the ACM, 42(12), 40-46. https://dl.acm.org/doi/10.1145/322796.322806
Team Red, CS 410 Spring 2020
For enterprises of any size, the release of sensitive information can provide bad actors unauthorized access to private digital assets, potentially resulting in tarnished reputations and costing millions of dollars in damage.
By employing a convenient and actively maintained web crawler or file scanner to scour web content for sensitive data, enterprises will be kept notified of potential data leaks and unauthorized access to sensitive information.
The Red Team is comprised of students at Old Dominion University who oversee the development of Sensitive Information Detection & Reporting (SIDR), software that will help the University's Computer Science Department identify data leaks.
Andrew Paterson
Cameron Allen
Dane Bruce
Evan Mulloy
Michael Hewitt
Kasey Howlett
Adams, A., & Sasse, M. A. (1999). Users are not the enemy. Communications of the ACM, 42(12), 40-46. https://dl.acm.org/doi/10.1145/322796.322806
Bakker, R. (2018, December 5). Evolving Regular Expression Features for Text Classification with Genetic Programming (Publication No. 10548017) [Master’s thesis, University of Amsterdam]. https://esc.fnwi.uva.nl/thesis/centraal/files/f565297164.pdf
Cisco. (2018). Small and Mighty: How Small and Midmarket Businesses Can Fortify Their Defenses Against Today's Threats. https://www.cisco.com/c/dam/global/hr_hr/solutions/small-business/pdf/small-mighty-threat.pdf
Columbus, L. (2019, February 26). 74% Of Data Breaches Start With Privileged Credential Abuse. Forbes. https://www.forbes.com/sites/louiscolumbus/2019/02/26/74-of-data-breaches-start-with-privileged-credential-abuse
Funke, D. (2019, September 23). Public data breaches have increased over the past decade [Graph]. PolitiFact. https://www.politifact.com/article/2019/sep/23/numbers-how-common-are-data-breaches-and-what-can-/
Gartner. (2018, December 6). Gartner Data Shows 87 Percent of Organizations Have Low BI and Analytics Maturity. https://www.gartner.com/en/newsroom/press-releases/2018-12-06-gartner-data-shows-87-percent-of-organizations-have-low-bi-and-analytics-maturity
Goodin, D. (2013, January 24). PSA: Don’t upload your important passwords to GitHub. Ars Technica. https://arstechnica.com/information-technology/2013/01/psa-dont-upload-your-important-passwords-to-github/
Goodin, D. (2014, January 8). Hackers use Amazon cloud to scrape mass number of LinkedIn member profiles. Ars Technica. https://arstechnica.com/information-technology/2014/01/hackers-use-amazon-cloud-to-scrape-mass-number-of-linkedin-member-profiles/
International Business Machines. (2019). Average cost of data breach [Infographic]. Mybluemix. https://databreachcalculator.mybluemix.net/
Johnson, A. (2020, February 3). Even Public, Visible Data on Your Website Can Benefit Hackers. TechyGeeksHome. https://blog.techygeekshome.info/2020/02/even-public-visible-data-on-your-website-can-benefit-hackers/
Kirby, D. (2018, May 21). Five Types of Sensitive Data Almost All Companies Handle. Kirbside Consulting. https://kirbside.com/blog/five-types-of-sensitive-data-almost-all-companies-handle/
Laney, D. (2018, October 22). Gartner's Enterprise Information Management Maturity Model. Gartner. https://www.gartner.com/document/3236418
Larkey, S. N. (2019). Exploring the Strategies Cybersecurity Specialist Need to Minimize Security Risks in Non-profit Organizations (Publication No. 27540543) [Doctoral dissertation, Colorado Technical University]. ProQuest Dissertations Publishing.
Moorcraft, B. (2019, April 16). Non-profits are a target for data breach. Insurance Business. https://www.insurancebusinessmag.com/us/news/non-profits/nonprofits-are-a-target-for-data-breach-165039.aspx
Rosati, P., Deeney, P., Cummins, M., Van der Werff, L., & Lynn, T. (2019). Social media and stock price reaction to data breach announcements: Evidence from US listed companies. Research in International Business and Finance, 47, 458-469. https://doi-org.proxy.lib.odu.edu/10.1016/j.ribaf.2018.09.007
SecurityTrails Team. (2018, November 27). Top 5 Ways to Handle a Data Breach. SecurityTrails. https://securitytrails.com/blog/top-5-ways-handle-data-breach
Steinberg, J. (2018, April 28). 12 Types Of Data That Businesses Need To Protect But Often Do Not. https://josephsteinberg.com/12-types-of-data-that-businesses-need-to-protect-but-often-do-not/
Thomas, F., Li, F., Zand, A., Barrett, J., Ranieri, J., Invernizzi, L., Markov, Y., Comanescu, O., Eranti, V., Moscicki, A., Margolis, D., Paxson, V., & Bursztein, E. (2017). Data breaches, phishing, or malware? Understanding the risks of stolen credentials. CCS ‘17: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 1421-1434. https://doi.org/10.1145/3133956.3134067
Verizon. (2019). 2019 Data Breach Investigation Report. https://enterprise.verizon.com/resources/reports/dbir
Winder, D. (2019, August 20). Data Breaches Expose 4.1 Billion Records In First Six Months Of 2019. Forbes. https://www.forbes.com/sites/daveywinder/2019/08/20/data-breaches-expose-41-billion-records-in-first-six-months-of-2019/