Leaking of Confidential Personal Information Cover Image

Leaking of Confidential Personal Information
Leaking of Confidential Personal Information

Author(s): Marjan Marjanović
Subject(s): Security and defense, ICT Information and Communications Technologies
Published by: Fakultet za poslovne studije i pravo
Keywords: corporate security; information protection; information security; leaking of confidential personal information

Summary/Abstract: The aim of this paper is to point to the significance of corporate information security and empirical study of leaking confidential personal information in 2017 in the world, for commercial and non-commercial state organizations, which were caused by malicious or neglecting activities of employees or external attackers and their percentage share according to the criteria determined. The study was based on database created based on public announcement on the cases of leaking of confidential information. The criteria includes less than 1% of cases of the assumed total number of leaking. The criteria of this categorization of leaking were chosen in such a manner that category studying contains enough elements in order for the research field formation to enable the theoretical observation of the sample and the results and trends observed the generalization of the conclusion. The results have shown that in 2017 there were registered 1505 cases of information leaking, of which 965,9 million of personal. 32,2% was caused by external ill-wisher and 65,4% the employees. Personal data and financial information are the most frequent objects of the attack – 90,8%. The networks are the most frequent channels of leaking information– 45,6%. The greatest percentage of information leaking is in commercial medium companies and the most attractive economy branch for the attacks is in the field of high technologies, trade and transport. The data of trade, transport and high technology organizations are usually attacked from the outside, while financial, medical and educational organizations are as a rule attacked by the insiders. For the theft of the data, less and less are used electronic mail, portable media, services for rapid messages because the control of these channels is big. The sources of hackers are closed uncontrolled channels whose protection systems either do not work or they are not efficient.

  • Issue Year: 7/2017
  • Issue No: 21
  • Page Range: 133-147
  • Page Count: 15
  • Language: English