|
美国Verizon《2018年数据泄漏调查报告》原文
Don’t be shy—welcome to the party. As always, this report is comprised of real-world data breaches and security incidents—either investigated by us or provided by one of our outstanding data contributors. The statements you will read in the pages that follow are data- driven, either by the incident corpus that is the foundation of this publication, or by non-incident datasets contributed by several security vendors. We combat bias by utilizing these types of data as opposed to surveys, and collecting similar data from multiple sources. We use analysis of non-incident tasets to enrich and support our incident and breach findings. Alas, as with any security report, some level of bias does remain, which we discuss in Appendix E. |