An Analysis of Cybersecurity Data Breach in The State of California

Zakaria Tayeb Bey, Michael Opoku Agyeman*

*Corresponding author for this work

Research output: Contribution to Book/ReportConference Contributionpeer-review

Abstract

As the wave of data breaches continues to crash down on organisations, we will analyse the largest publicly available database of data breaches in the state of California using the public data breach database functioning under the state notification law of data breach. The dataset contains records since January 2012. These records were analysed in order to classify and identify California data breaches by multiple company types, attack vectors and sto-len personal information. The main findings were that Software vulnerabil-ity is the most common attack vector due to third-party software, the finan-cial industry is the most targeted industry while both large and small organ-isations are equally targeted by attackers. The analysis also found that cred-it/debit card information and social security numbers represent the most stolen personal information.
Original languageEnglish
Title of host publicationCybersecurity in the Age of Smart Societies
PublisherSpringer
Pages159-170
ISBN (Electronic)978-3-031-20160-8
ISBN (Print)978-3-031-20159-2
DOIs
Publication statusPublished - 3 Jan 2023
EventInternational Conference on Global Security, Safety and Sustainability (ICGS3) -
Duration: 7 Sept 202210 Sept 2022
https://london.northumbria.ac.uk/icgs3-22/

Publication series

NameAdvanced Sciences and Technologies for Security Applications
PublisherSpringer Nature
ISSN (Print)1613-5113

Conference

ConferenceInternational Conference on Global Security, Safety and Sustainability (ICGS3)
Period7/09/2210/09/22
Internet address

Keywords

  • Cybersecurity
  • Data Breach
  • Cyber-attack
  • Ethical Hacking
  • Internet of Things
  • IoT
  • Security
  • California Data Breach Database

Fingerprint

Dive into the research topics of 'An Analysis of Cybersecurity Data Breach in The State of California'. Together they form a unique fingerprint.

Cite this