Must Follow Writting Instructions and Serious writers only

Must Follow Writting Instructions and Serious writers only

At the end of the 2012 report (Below link i.e. verizon web), you’ll see a set of recommendations. Your task is to select one recommendation from that report and create a Performance Measures document that an organization could use to assess how well that recommendation was implemented. Your textbook provides a template and examples of a Performance Measures document (see Tables 7-2 & 7-3).

http://www.verizonenterprise.com/resources/reports/rp_data-breach-investigations-report-2012-press_en_xg.pdf

I’ve attached the sample Performance measures document…Your work must be similar to the attached template

7.2 and 7.3 template.pdf

2
executIve summary
2011 will almost certainly go down as a year of civil and cultural uprising . Citizens revolted, challenged, and even
overthrew their governments in a domino effect that has since been coined the “arab spring,” though it stretched
beyond a single season . Those disgruntled by what they perceived as the wealth-mongering “1%” occupied Wall
street along with other cities and venues across the globe . There is no shortage of other examples .
This unrest that so typified 2011 was not, however, constrained to the physical world . The online world was rife
with the clashing of ideals, taking the form of activism, protests, retaliation, and pranks . While these activities
encompassed more than data breaches (e .g ., DDos attacks),
the theft of corporate and personal information was
certainly a core tactic . This re-imagined and re-invigorated
specter of “hacktivism” rose to haunt organizations around
the world . Many, troubled by the shadowy nature of its
origins and proclivity to embarrass victims, found this trend more frightening than other threats, whether real or
imagined . Doubly concerning for many organizations and executives was that target selection by these groups
didn’t follow the logical lines of who has money and/or valuable information . enemies are even scarier when you
can’t predict their behavior
.
It wasn’t all protest and lulz, however
. Mainline cybercriminals continued to automate and streamline their method
du jour of high-volume, low-risk attacks against weaker targets . Much less frequent, but arguably more damaging,
were continued attacks targeting trade secrets, classified information, and other intellectual property . We
certainly encountered many faces, varied tactics, and diverse motives in the past year, and in many ways, the 2012
Data breach Investigations Report (DbIR) is a recounting of the many facets of corporate data theft .
855 incidents, 174 million compromised records.
This year our DbIR includes more incidents, derived from more contributors, and represents a broader and more
diverse geographical scope . The number of compromised records across these incidents skyrocketed back up to
174 million after reaching an all-time low (or high, depending on your point of view) in last year’s report of four
million . In fact, 2011 boasts the second-highest data loss total since we started keeping track in 2004 .
once again, we are proud to announce that the United states secret service (Usss) and the Dutch national High
Tech Crime Unit (nHTCU) have joined us for this year’s report . We also
welcome the australian federal Police (afP), the Irish Reporting &
Information
security
service (IRIssCeRT), and the Police Central
e-Crime Unit (PCeU) of the london Metropolitan Police .
these
organizations have broadened the scope of the DBIr tremendously
with regard to data breaches around the globe. We heartily thank
them all for their spirit of cooperation, and sincerely hope this report
serves to increase awareness of cybercrime, as well as our collective
ability to fight it.
With the addition of Verizon’s 2011 caseload and data contributed
from the organizations listed above, the DbIR series now spans eight years, well over 2000 breaches, and greater
than one billion compromised records . It’s been a fascinating and informative journey, and we are grateful that
many of you have chosen to come along for the ride . as always, our goal is that the data and analysis presented in
this report prove helpful to the planning and security efforts of our readers . We begin with a few highlights below
.
This re-imagined and re-invigorated
specter of “hacktivism” rose to haunt
organizations around the world
.
It wasn’t all protest and
lulz, however
. Mainline
cybercriminals continued to
automate and streamline their
method du jour of high-volume,
low-risk attacks against
weaker targets .