We are also very glad to have the USSS back with us for the 2011 DBIR

We are also very glad to have the usss back with us

This preview shows page 7 - 9 out of 72 pages.

We are also very glad to have the USSS back with us for the 2011 DBIR. Additionally, we have the pleasure of welcoming the NHTCU to the team. Through this cooperative e ort, we had the privilege—and challenge—of examining about 800 new data compromise incidents since our last report. To put that in perspective, the entire Verizon-USSS dataset from 2004 to 2009 numbered just over 900 breaches. We very nearly doubled the size of our dataset in 2010 alone!But anyone can put together a large dataset, right? What matters is what that dataset is comprised of, how it was put together and what conclusions we can draw from it. That is precisely what the rest of this section attempts to do. Verizon Data Collection MethodologyThe underlying methodology used by Verizon remains unchanged from that of previous years. All results are based on rsthand evidence collected during paid external forensic investigations conducted by Verizon from 2004 to 2010. The 2010 caseload is the primary analytical focus of the report, but the entire range of data is referenced extensively throughout. Though the Investigative Response (IR) team works a variety of engagements, only those involving a con rmed data compromise are represented in this report. To help ensure reliable and consistent input, all investigators use the Verizon Enterprise Risk and Incident Sharing (VERIS) framework to record case data and other relevant details (fuller explanation of this to follow). The information collected using VERIS is then submitted to members of the RISK Intelligence team for further validation and analysis. During the aggregation process, information regarding the identity of breach victims is removed from the repository of case data.We are also very glad to have the USSS back with us for the 2011 DBIR. Additionally, we have the pleasure of welcoming the NHTCU to the team. Through this cooperative eort, we had the privilege—and challenge—of examining about 800 new data compromise incidents since our last report.
Background image
8USSS Data Collection MethodologyIn terms of data collection, the USSS methodology diers little from that of Verizon. Agents of the USSS use an internal application based on the VERIS framework to record pertinent case details. To accomplish this, they utilized investigative notes, reports provided by the victim or other forensic rms, and their own experience gained in handling the case.From the numerous cases worked by the USSS during 2010, the scope was narrowed to only those involving conrmed organizational data breaches1in alignment with the focus of the DBIR. The scope was further narrowed to include only cases for which Verizon did not conduct the forensic investigation2. For the 2010 DBIR, a sample of qualifying USSS cases was included since the scope of data collection spanned multiple years. This year information was collected on a much larger proportion of relevant 2010 cases (those not included mainly consist of ongoing cases and some currently in trial). Thus, this 2011 DBIR covers most of the organizational data breaches investigated by the USSS in 2010. This yielded 667 con
Background image
Image of page 9

You've reached the end of your free preview.

Want to read all 72 pages?

  • Fall '14
  • Smith,R
  • Secret Service, United States Secret Service, USSS

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

Stuck? We have tutors online 24/7 who can help you get unstuck.
A+ icon
Ask Expert Tutors You can ask You can ask You can ask (will expire )
Answers in as fast as 15 minutes