<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>cher&#039;s canvas &#187; Verizon</title>
	<atom:link href="https://jollyvip.com/research/category/verizon/feed/" rel="self" type="application/rss+xml" />
	<link>https://jollyvip.com/research</link>
	<description>Exploring the messy confluence of technology and people (law)</description>
	<lastBuildDate>Mon, 20 Feb 2023 16:44:15 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.4.1</generator>
		<item>
		<title>Nine Patterns &#8211; Verizon 2014 report</title>
		<link>https://jollyvip.com/research/2015/04/25/nine-patterns-verizon-2014-report/</link>
		<comments>https://jollyvip.com/research/2015/04/25/nine-patterns-verizon-2014-report/#comments</comments>
		<pubDate>Sat, 25 Apr 2015 22:44:22 +0000</pubDate>
		<dc:creator>admin</dc:creator>
				<category><![CDATA[2014]]></category>
		<category><![CDATA[Extracts]]></category>
		<category><![CDATA[Verizon]]></category>

		<guid isPermaLink="false">http://jollyvip.com/research/?p=685</guid>
		<description><![CDATA[Catching up with my collection of notes and posting this Verizon 2014 image showing the nine common incident patterns. The report states &#8216;Within each of those patterns, we cover the actors who cause them, the actions they use, assets they target, timelines in which all this took place, and give specific recommendations to thwart them.&#8217; <a href='https://jollyvip.com/research/2015/04/25/nine-patterns-verizon-2014-report/' class='excerpt-more'>[...]</a>]]></description>
			<content:encoded><![CDATA[<p>Catching up with my collection of notes and posting this Verizon 2014 image showing the nine common incident patterns. The report states &#8216;Within each of those patterns, we cover the actors who cause them, the actions they use, assets they target, timelines in which all this took place, and give specific recommendations to thwart them.&#8217;<br />
<a href="http://jollyvip.com/research/files/2015/04/nine-patterns-verizon1.png"><img src="http://jollyvip.com/research/files/2015/04/nine-patterns-verizon1.png" alt="" title="nine patterns verizon" width="703" height="640" class="aligncenter size-full wp-image-691" />Nine Patterns</a></p>
<p>BREACHES VS INCIDENTS?<br />
This report uses the following definitions:<br />
Incident: A security event that compromises the integrity, confidentiality, or availability of an information asset.<br />
Breach: An incident that results in the disclosure or potential exposure of data.<br />
Data disclosure: A breach for which it was confirmed that data was actually disclosed (not just exposed) to an unauthorized party.</p>
]]></content:encoded>
			<wfw:commentRss>https://jollyvip.com/research/2015/04/25/nine-patterns-verizon-2014-report/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
