Asee peer logo

Unveiling Cyber Threats: A Comprehensive Analysis of Connecticut Data Breaches

Download Paper |

Conference

2024 ASEE North East Section

Location

Fairfield, Connecticut

Publication Date

April 19, 2024

Start Date

April 19, 2024

End Date

April 20, 2024

Page Count

12

DOI

10.18260/1-2--45786

Permanent URL

https://peer.asee.org/45786

Download Count

115

Paper Authors

biography

Robin Chataut Quinnipiac University

visit author page

Robin Chataut is an assistant professor of Cybersecurity and Computer Science at the School of Computing and Engineering at Quinnipiac University. He earned his Ph.D. in Computer Science and Computer Engineering from the University of North Texas.

His research interests lie in the areas of network security, cybersecurity, AI, ML, and next-generation networks. His significant contributions to the field are evidenced by his design, implementation, and optimization of complex algorithms and systems architectures. He has authored several research articles and has secured multiple research grants, underlining his commitment to advancing cybersecurity and computer science.

Beyond his research and academic commitments, he remains an active participant in the academic community. As an IEEE Senior Member, he serves in multiple international scientific journals and conferences, contributing significantly to the advancement of his fields of expertise.

visit author page

biography

YUSUF USMAN Quinnipiac University

visit author page

Yusuf is a rising cybersecurity professional pursuing an MS in Cybersecurity at Quinnipiac University. His research centers on the innovative applications of machine learning (ML) and artificial intelligence (AI) for advanced threat detection and mitigation, focusing on phishing attacks, automated defense mechanisms, and malware identification. Yusuf's unique perspective on AI-driven security is further informed by his research on autonomous vehicles.

Prior to his graduate studies, Yusuf gained valuable experience as a Graduate Research Assistant at Quinnipiac University, an Information Security Analyst at the National Assembly of Nigeria, and an IT Support Specialist at LamidoTex NIG LTD. These diverse roles solidified his foundation in networking, cloud network design, and operating system security.

Yusuf's commitment to continuous learning, his passion for exploration through travel, and his interest in the intersection of technology and business strategy make him a well-rounded cybersecurity expert.

visit author page

author page

Frederick Scholl Quinnipiac University

Download Paper |

Abstract

Data breaches continue to be a pervasive threat in the digital landscape, impacting both businesses and individuals. This study conducts a thorough empirical analysis of Connecticut's data breaches in 2022, analyzing the data provided by The Office of the Attorney General, Connecticut. Our methodology involves a detailed examination of the breach records, focusing on the types of companies affected, methodologies of the attacks, and specific information compromised. We applied statistical analysis techniques to uncover patterns and trends within the data. Our investigation reveals a significant vulnerability in smaller businesses, with the healthcare and financial sectors facing the most severe challenges. Ransomware and phishing emerge as the most frequent attack methods, often leading to the compromise of sensitive personal data. Additionally, we noted that smaller businesses were not only more frequently targeted but also took longer to detect and report breaches, exacerbating the impact.

In response to these findings, the study underscores the urgent need for enhanced cybersecurity measures, particularly for small businesses. It provides a detailed understanding of the current cyber threat landscape. It serves as an essential resource for businesses, particularly smaller ones, to comprehend and strengthen their defenses against these evolving threats. The recommendations offered are designed to assist businesses in bolstering their cybersecurity measures, thus safeguarding against the complexities brought about by an increasingly interconnected digital world. The findings are especially pertinent in the context of growing interconnectivity and information sharing, highlighting the necessity for businesses and policymakers to adapt and reinforce their cybersecurity frameworks to effectively counter these sophisticated threats. The study's comprehensive analysis and actionable recommendations offer a roadmap for enhancing digital security in an increasingly interconnected world.

Chataut, R., & USMAN, Y., & Scholl, F. (2024, April), Unveiling Cyber Threats: A Comprehensive Analysis of Connecticut Data Breaches Paper presented at 2024 ASEE North East Section, Fairfield, Connecticut. 10.18260/1-2--45786

ASEE holds the copyright on this document. It may be read by the public free of charge. Authors may archive their work on personal websites or in institutional repositories with the following citation: © 2024 American Society for Engineering Education. Other scholars may excerpt or quote from these materials with the same citation. When excerpting or quoting from Conference Proceedings, authors should, in addition to noting the ASEE copyright, list all the original authors and their institutions and name the host city of the conference. - Last updated April 1, 2015