{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T18:56:22Z","timestamp":1770749782923,"version":"3.50.0"},"publisher-location":"Cham","reference-count":106,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030587024","type":"print"},{"value":"9783030587031","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,9,9]],"date-time":"2020-09-09T00:00:00Z","timestamp":1599609600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,9,9]],"date-time":"2020-09-09T00:00:00Z","timestamp":1599609600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-58703-1_11","type":"book-chapter","created":{"date-parts":[[2020,9,8]],"date-time":"2020-09-08T06:02:47Z","timestamp":1599544967000},"page":"170-192","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Deficiencies of Compliancy for Data and Storage"],"prefix":"10.1007","author":[{"given":"Howard B.","family":"Goodman","sequence":"first","affiliation":[]},{"given":"Pam","family":"Rowland","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,9]]},"reference":[{"key":"11_CR1","unstructured":"What is a Datacenter? Cisco. https:\/\/www.cisco.com\/c\/en\/us\/solutions\/data-center-virtualization\/what-is-a-data-center.html . Accessed 13 Dec 2019"},{"key":"11_CR2","unstructured":"What is a Datacenter? Definition from Techopedia. Techopedia.com. https:\/\/www.techopedia.com\/definition\/349\/data-center . Accessed 13 Dec 2019"},{"key":"11_CR3","unstructured":"Beal, V.: What is structured data? Webopedia definition. https:\/\/www.webopedia.com\/TERM\/S\/structured_data.html . Accessed 13 Dec 2019"},{"key":"11_CR4","unstructured":"Unstructured Data: Wikipedia, 03 December 2019"},{"key":"11_CR5","unstructured":"Weins, K.: Compare top public cloud providers: AWS vs Azure vs Google. Flexera Blog, 17 January 2018. https:\/\/www.flexera.com\/blog\/cloud\/2018\/01\/compare-top-public-cloud-providers-aws-vs-azure-vs-google\/ . Accessed 13 Dec 2019"},{"key":"11_CR6","unstructured":"Poojary, P.: Understanding object storage and block storage use cases|cloud academy blog. Cloud Academy, 12 March 2019. https:\/\/cloudacademy.com\/blog\/object-storage-block-storage\/ . Accessed 13 Dec 2019"},{"key":"11_CR7","unstructured":"IBM: File-storage, 14 October 2019. https:\/\/www.ibm.com\/cloud\/learn\/file-storage . Accessed 13 Dec 2019"},{"key":"11_CR8","unstructured":"Porter, Y., Piscopo, T., Marke, D.: Object storage versus block storage: understanding the technology differences. Druva, 14 August 2014. https:\/\/www.druva.com\/blog\/object-storage-versus-block-storage-understanding-technology-differences\/ . Accessed 13 Dec 2019"},{"key":"11_CR9","unstructured":"PCI SSC: PCI data security standard (PCI DSS). PCI SSC (May 2017)"},{"key":"11_CR10","unstructured":"Patterson, C.: Why your current disaster recovery strategy may not cover compliance. Navisite (November 2018)"},{"key":"11_CR11","unstructured":"Palmer, D.: What is GDPR? Everything you need to know about the new general data protection regulations. ZDNet. https:\/\/www.zdnet.com\/article\/gdpr-an-executive-guide-to-what-you-need-to-know\/ . Accessed 16 Dec 2019"},{"key":"11_CR12","unstructured":"PCI SSC, \u201cPayment Card Industry (PCI) Data Security Standard.\u201d PCI SSC, Jun-2015"},{"key":"11_CR13","unstructured":"PCI SSC: The prioritized approach to pursue PCI DSS compliance. PCI SSC (June 2018)"},{"key":"11_CR14","unstructured":"Sivilli, F.: What is HIPAA compliance? | Requirements to be HIPAA compliant. Compliancy Group. https:\/\/compliancy-group.com\/what-is-hipaa-compliance\/ . Accessed 16 Dec 2019"},{"key":"11_CR15","unstructured":"Amadeo, K.: 4 ways sarbanes-oxley stops corporate fraud. The Balance, October 2019. https:\/\/www.thebalance.com\/sarbanes-oxley-act-of-2002-3306254 . Accessed 16 Dec 2019"},{"key":"11_CR16","unstructured":"Frequently Asked Questions | FedRAMP.gov. https:\/\/fedramp.gov\/faqs\/ . Accessed 17 Dec 2019"},{"key":"11_CR17","unstructured":"What\u2019s Data Privacy Law in Your Country?: PrivacyPolicy.org, September 2019. https:\/\/www.privacypolicies.com\/blog\/privacy-law-by-country\/ . Accessed 29 Dec 2019"},{"key":"11_CR18","unstructured":"Mulligan, S.P., Freeman, W.C., Linebaugh, C.D.: Data protection law: an overview. Congressional Research Service (March 2019)"},{"key":"11_CR19","unstructured":"State Data Breach Law Summary: Baker & Hostetler LLP (July 2018)"},{"key":"11_CR20","unstructured":"California Consumer Privacy Act: Wikipedia, 18 December 2019"},{"key":"11_CR21","unstructured":"Sebayan, D.: How NIST can protect the CIA triad, including the often overlooked \u2018I\u2019 \u2013 integrity. IT Governance USA Blog, Apt 2018. https:\/\/www.itgovernanceusa.com\/blog\/how-nist-can-protect-the-cia-triad-including-the-often-overlooked-i-integrity . Accessed 17 Dec 2019"},{"key":"11_CR22","unstructured":"SNIA: Contact us via LiveChat!. SNIA (November 2018)"},{"key":"11_CR23","unstructured":"Schopmeyer, K.: Automation of SMI-S managed storage systems with Pywbem, p. 47 (2017)"},{"key":"11_CR24","unstructured":"Hubbert, S.: Datacenter storage; cost-effective strategies, implementation, and management. SNIA (2011)"},{"issue":"1","key":"11_CR25","doi-asserted-by":"publisher","first-page":"1247","DOI":"10.1007\/s10586-017-1382-6","volume":"22","author":"E Daniel","year":"2017","unstructured":"Daniel, E., Vasanthi, N.A.: LDAP: a lightweight deduplication and auditing protocol for secure data storage in cloud environment. Cluster Comput. 22(1), 1247\u20131258 (2017). https:\/\/doi.org\/10.1007\/s10586-017-1382-6","journal-title":"Cluster Comput."},{"issue":"2","key":"11_CR26","doi-asserted-by":"publisher","first-page":"929380","DOI":"10.1155\/2015\/929380","volume":"11","author":"S-W Park","year":"2015","unstructured":"Park, S.-W., Lim, J., Kim, J.N.: A secure storage system for sensitive data protection based on mobile virtualization. Int. J. Distrib. Sens. Netw. 11(2), 929380 (2015). https:\/\/doi.org\/10.1155\/2015\/929380","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"11_CR27","doi-asserted-by":"publisher","unstructured":"Butler, K.R.B., McLaughlin, S., McDaniel, P.D.: Rootkit-resistant disks. In: Proceedings of the 15th ACM Conference on Computer and Communications Security - CCS 2008, Alexandria, Virginia, USA, p. 403 (2008). https:\/\/doi.org\/10.1145\/1455770.1455821","DOI":"10.1145\/1455770.1455821"},{"key":"11_CR28","doi-asserted-by":"publisher","unstructured":"Tang, Y., et al.: NodeMerge: template based efficient data reduction for big-data causality analysis. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security - CCS 2018, Toronto, Canada, pp. 1324\u20131337 (2018). https:\/\/doi.org\/10.1145\/3243734.3243763","DOI":"10.1145\/3243734.3243763"},{"key":"11_CR29","unstructured":"Hibbard, E.: Intro to encryption and key management: why, what and where? SNIA (2016)"},{"key":"11_CR30","unstructured":"Willett, M.: Implementing stored-data encryption, p. 50 (2012)"},{"key":"11_CR31","unstructured":"SNIA: Cloud data management interface (CDMITM) version 1.1.1. SNIA (March 2015)"},{"key":"11_CR32","unstructured":"SNIA: Storage security: an overview as applied to storage management version 1. SNIA (August 2016)"},{"key":"11_CR33","unstructured":"SNIA: Storage security: encryption and key management. SNIA (August 2015)"},{"key":"11_CR34","unstructured":"McKay, K.A., Polk, W.T., Chokhani, S.: Guidelines for the selection, configuration, and use of transport layer security (TLS) implementations. NIST (April 2014)"},{"key":"11_CR35","unstructured":"ENISA: ENISA threat landscape report 2018 15 top cyberthreats and trends. ENISA (January 2019)"},{"issue":"11","key":"11_CR36","doi-asserted-by":"publisher","first-page":"1593","DOI":"10.1093\/comjnl\/bxw019","volume":"59","author":"L Zhou","year":"2016","unstructured":"Zhou, L., Varadharajan, V., Gopinath, K.: A secure role-based cloud storage system for encrypted patient-centric health records. Comput. J. 59(11), 1593\u20131611 (2016). https:\/\/doi.org\/10.1093\/comjnl\/bxw019","journal-title":"Comput. J."},{"key":"11_CR37","unstructured":"Sarkar, M.K., Chatterjee, T.: Enhancing data storage security in cloud computing through steganography (2014)"},{"key":"11_CR38","doi-asserted-by":"publisher","unstructured":"Krahn, R., Trach, B., Vahldiek-Oberwagner, A., Knauth, T., Bhatotia, P., Fetzer, C.: Pesos: policy enhanced secure object store. In: Proceedings of the Thirteenth EuroSys Conference on - EuroSys 2018, Porto, Portugal, pp. 1\u201317 (2018). https:\/\/doi.org\/10.1145\/3190508.3190518","DOI":"10.1145\/3190508.3190518"},{"key":"11_CR39","unstructured":"Hibbard, E.A.: Best practices for cloud security and privacy. SBIA (2014)"},{"key":"11_CR40","unstructured":"Hibbard, E., Rivera, T.: Reforming EU data protections\u2026 No ordinary sequel. SNIA (September 2014)"},{"key":"11_CR41","unstructured":"SNIA: TLS specification for storage systems. SNIA (November 2014)"},{"key":"11_CR42","unstructured":"SNIA: Storage networking industry association. SNIA (March 2018)"},{"key":"11_CR43","unstructured":"PCI SSC: Payment card industry (PCI) data security standard report on compliance. PCI DSS v3.2 Template for Report on Compliance. PCI (June 2018)"},{"key":"11_CR44","unstructured":"PCI SSC: PCI DSS quick reference guide understanding the payment card industry data security standard version 3.2. PCI SSC (October 2010)"},{"key":"11_CR45","unstructured":"Schaffer, K.: ITL bulletin May 2019 FIPS 140-3 adopts ISO\/IEC standards. NIST, p. 3 (May 2019)"},{"key":"11_CR46","doi-asserted-by":"crossref","unstructured":"Brand\u00e3o, L., Davidson, M., Mouha, N., Vassilev, A.: ITL bulletin for APRIL 2019 time to standardize threshold schemes for cryptographic primitives. NIST, p. 6 (April 2019)","DOI":"10.6028\/NIST.IR.8214"},{"key":"11_CR47","doi-asserted-by":"crossref","unstructured":"Zyskind, G., Nathan, O., Pentland, A.: Decentralizing privacy: using blockchain to protect personal data. IEEE (Juk 2015)","DOI":"10.1109\/SPW.2015.27"},{"key":"11_CR48","doi-asserted-by":"crossref","unstructured":"Wang, H., Yang, D., Duan, N., Guo, Y., Zhang, L.: Medusa: blockchain powered log storage system. IEEE (March 2019)","DOI":"10.1109\/ICSESS.2018.8663935"},{"key":"11_CR49","doi-asserted-by":"publisher","unstructured":"Meslhy, E., Abd elkader, H., Eletriby, S.: Data security model for cloud computing. J. Commun. Comput. 10, 1047\u20131062 (2013). https:\/\/doi.org\/10.13140\/2.1.2064.4489","DOI":"10.13140\/2.1.2064.4489"},{"key":"11_CR50","doi-asserted-by":"publisher","unstructured":"Jovanovic, V., Mirzoev, T.: Teaching storage infrastructure management and security. In: 2010 Information Security Curriculum Development Conference, New York, NY, USA, pp. 41\u201344 (2010). https:\/\/doi.org\/10.1145\/1940941.1940952","DOI":"10.1145\/1940941.1940952"},{"key":"11_CR51","doi-asserted-by":"publisher","unstructured":"Butler, K.R.B., McLaughlin, S.E., McDaniel, P.D.: Non-volatile memory and disks: avenues for policy architectures. In: Proceedings of the 2007 ACM Workshop on Computer Security Architecture, New York, NY, USA, pp. 77\u201384 (2007). https:\/\/doi.org\/10.1145\/1314466.1314479","DOI":"10.1145\/1314466.1314479"},{"key":"11_CR52","doi-asserted-by":"publisher","unstructured":"Paik, J.-Y., Choi, J.-H., Jin, R., Wang, J., Cho, E.-S.: A storage-level detection mechanism against crypto-ransomware, pp. 2258\u20132260 (2018). https:\/\/doi.org\/10.1145\/3243734.3278491","DOI":"10.1145\/3243734.3278491"},{"key":"11_CR53","unstructured":"Hibbard, E.A.: SNIA storage security best practices. SNIA (2015)"},{"key":"11_CR54","unstructured":"Hibbard, E.A.: SNIA storage security best practices. SNIA (2011)"},{"key":"11_CR55","unstructured":"ISO: ISO\/IEC 27040:2015 information technology\u2014security techniques\u2014storage security. ISO (2015)"},{"key":"11_CR56","unstructured":"SNIA: NVM programming model (NPM). SNIA (June 2017)"},{"key":"11_CR57","unstructured":"SNIA: Storage security: fibre channel security. SNIA (2016)"},{"key":"11_CR58","unstructured":"SNIA: Sanitization. SNIA (March 2015)"},{"key":"11_CR59","unstructured":"SNIA: Architectural model for data integrity. SNIA (March 2012)"},{"key":"11_CR60","unstructured":"SNIA: Common RAID disk data format specification. SBIA (March 2009)"},{"key":"11_CR61","unstructured":"SNIA: Hypervisor storage interfaces for storage optimization white paper. SNIA (June 2010)"},{"key":"11_CR62","doi-asserted-by":"crossref","unstructured":"Gordan, J.: Practical Data Security (Unicom Applied Information Technology), 1st edn. (2019)","DOI":"10.1201\/9780429447471-1"},{"key":"11_CR63","doi-asserted-by":"crossref","unstructured":"Talib, A.M., Atan, R., Murad, M.A.A., Abdullah, R.: A framework of multi agent system to facilitate security of cloud data storage. In: International Conference on Cloud Computing Virtualization, pp. 241\u2013258 (2010)","DOI":"10.5176\/978-981-08-5837-7_121"},{"key":"11_CR64","unstructured":"Dharma, R., Venugopal, V., Sake, S., Dinh, V.: Building secure SANs. EMC (April 2013)"},{"key":"11_CR65","unstructured":"IBM: IBM storage insights: security guide. IBM (September 2019)"},{"key":"11_CR66","doi-asserted-by":"publisher","unstructured":"Hasan, R., Yurcik, W.: A statistical analysis of disclosed storage security breaches. In: Proceedings of the Second ACM Workshop on Storage Security and Survivability, New York, NY, USA, pp. 1\u20138 (2006). https:\/\/doi.org\/10.1145\/1179559.1179561","DOI":"10.1145\/1179559.1179561"},{"key":"11_CR67","doi-asserted-by":"publisher","unstructured":"Vasilopoulos, D., Elkhiyaoui, K., Molva, R., Onen, M.: POROS: proof of data reliability for outsourced storage. In: Proceedings of the 6th International Workshop on Security in Cloud Computing, New York, NY, USA, pp. 27\u201337 (2018). https:\/\/doi.org\/10.1145\/3201595.3201600","DOI":"10.1145\/3201595.3201600"},{"key":"11_CR68","doi-asserted-by":"crossref","unstructured":"Zhu, Y., Wang, H., Hu, Z., Ahn, G., Hu, H., Yau, S.S.: Dynamic audit services for integrity verification of outsourced storage in clouds. In: 2011 Proceedings of ACM Symposium on Applied Computing (SAC), pp. 1550\u20131557 (December 2010)","DOI":"10.1145\/1982185.1982514"},{"key":"11_CR69","doi-asserted-by":"crossref","unstructured":"Subha, T., Jayashri, S.: Efficient privacy preserving integrity checking model for cloud data storage security. IEEE (January 2017)","DOI":"10.1109\/ICoAC.2017.7951745"},{"key":"11_CR70","doi-asserted-by":"crossref","unstructured":"Hou, H., Yu, J., Hao, R.: Cloud storage auditing with deduplication supporting different security levels according to data popularity. ScienceDirect (Nay 2019)","DOI":"10.1016\/j.jnca.2019.02.015"},{"key":"11_CR71","doi-asserted-by":"publisher","DOI":"10.1201\/b11111","volume-title":"Cloud and Virtual Data Storage Networking","author":"G Schulz","year":"2011","unstructured":"Schulz, G.: Cloud and Virtual Data Storage Networking, 1st edn. CRC Press, Boca Raton (2011)","edition":"1"},{"key":"11_CR72","unstructured":"Kwon, J., Johnson, M.E.: Meaningful healthcare security: does \u2018meaningful-use\u2019 attestation improve information security performance? EBSCOhost (December 2018)"},{"key":"11_CR73","unstructured":"Dell EMC: Dell EMC UnityTM family security configuration guide. Dell EMC (December 2018)"},{"key":"11_CR74","unstructured":"HDS: Hitachi virtual storage platform (VSP) encryption engine non-proprietary Cryptographic-FIPS 140-2 Module Security Policy. HDS (February 2019)"},{"key":"11_CR75","doi-asserted-by":"publisher","unstructured":"Li, L., Qian, K., Chen, Q., Hasan, R., Shao, G.: Developing hands-on labware for emerging database security. In: Proceedings of the 17th Annual Conference on Information Technology Education, New York, NY, USA, pp. 60\u201364 (2016). https:\/\/doi.org\/10.1145\/2978192.2978225","DOI":"10.1145\/2978192.2978225"},{"key":"11_CR76","unstructured":"SNIA: Linear tape file system (LTFS) format specification. SNIA (May 2019)"},{"key":"11_CR77","unstructured":"SNIA: Self-contained information retention format (SIRF) specification. SNIA (December 2016)"},{"key":"11_CR78","unstructured":"SNIA: Multipath management API. SNIA (March 2010)"},{"key":"11_CR79","unstructured":"McMinn, M.: Information management\u2014extensible access method (XAM)\u2014Part 1: architecture. SNIA (June 2009)"},{"key":"11_CR80","unstructured":"McMinn, M.: Information management \u2013 extensible access method (XAM) \u2013 Part 2: C API. SNIA (June 2009)"},{"key":"11_CR81","unstructured":"McMinn, M.: Information management \u2013 extensible access method (XAM) \u2013 Part 3: Java API. SNIA (June 2009)"},{"key":"11_CR82","unstructured":"Dutch, M.: A data protection taxonomy. SNIA (June 2010)"},{"key":"11_CR83","unstructured":"SNIA: Data protection best practices. SNIA (October 2017)"},{"key":"11_CR84","volume-title":"Information Storage and Management: Storing, Managing, and Protecting Digital Information","author":"A Schopmeyer","year":"2009","unstructured":"Schopmeyer, A., Somasundaram, G.: Information Storage and Management: Storing, Managing, and Protecting Digital Information. O\u2019Reilly, Sebastopol (2009)"},{"key":"11_CR85","unstructured":"Chang, Z., Hao, Y.: The research of disaster recovery about the network storage system base on \u2018Safety Zone.\u2019 IEEE (October 2009)"},{"key":"11_CR86","doi-asserted-by":"crossref","unstructured":"Jian-hua, Z., Nan, Z.: Cloud computing-based data storage and disaster recovery. IEEE (August 2011)","DOI":"10.1109\/ICFCSE.2011.157"},{"key":"11_CR87","doi-asserted-by":"crossref","unstructured":"Wang, X., Cheng, G.: Design and implementation of universal city disaster recovery platform. IEEE (May 2018)","DOI":"10.1109\/IMCEC.2018.8469356"},{"key":"11_CR88","volume-title":"Crafting the InfoSec Playbook: Security Monitoring and Incident Response Master Plan","author":"J Bollinger","year":"2015","unstructured":"Bollinger, J., Enright, B., Valite, M.: Crafting the InfoSec Playbook: Security Monitoring and Incident Response Master Plan, 1st edn. O\u2019Reilly, Sebastopol (2015)","edition":"1"},{"key":"11_CR89","doi-asserted-by":"publisher","unstructured":"Zhou, J.: On the security of cloud data storage and sharing. In: Proceedings of the 2nd International Workshop on Security in Cloud Computing, New York, NY, USA, pp. 1\u20132 (2014). https:\/\/doi.org\/10.1145\/2600075.2600087","DOI":"10.1145\/2600075.2600087"},{"key":"11_CR90","doi-asserted-by":"publisher","unstructured":"Chen, M., Zadok, E.: Kurma: secure geo-distributed multi-cloud storage gateways. In: Proceedings of the 12th ACM International Conference on Systems and Storage - SYSTOR 2019, Haifa, Israel, pp. 109\u2013120 (2019). https:\/\/doi.org\/10.1145\/3319647.3325830","DOI":"10.1145\/3319647.3325830"},{"key":"11_CR91","unstructured":"Carlson, M., Espy, J.: IP-based drive management specification. SNIA (January 2017)"},{"key":"11_CR92","unstructured":"SNIA: iSCSI management API. SBIA (June 2008)"},{"key":"11_CR93","doi-asserted-by":"crossref","unstructured":"Fuxi, G., Yang, W.: Data Storage at the Nanoscale, 1st edn. Jenny Stanford Publishing (2015)","DOI":"10.1201\/b18094-2"},{"key":"11_CR94","unstructured":"Rouse, M.: What is blockchain storage? SearchStorage (June 2019). https:\/\/searchstorage.techtarget.com\/definition\/blockchain-storage . Accessed 15 Dec 2019"},{"key":"11_CR95","unstructured":"BlockApps: How blockchain will disrupt data storage. BlockApps (Dec 2017). https:\/\/blockapps.net\/blockchain-disrupt-data-storage\/ . Accessed 15 Dec 2019"},{"key":"11_CR96","doi-asserted-by":"crossref","unstructured":"Xu, Y.: Section-blockchain: a storage reduced blockchain protocol, the foundation of an autotrophic decentralized storage architecture. IEEE (December 2018)","DOI":"10.1109\/ICECCS2018.2018.00020"},{"key":"11_CR97","doi-asserted-by":"crossref","unstructured":"Zheng, Q., Li, Y., Chen, P., Dong, X.: An innovative IPFS-based storage model for blockchain. IEEE (December 2018)","DOI":"10.1109\/WI.2018.000-8"},{"key":"11_CR98","doi-asserted-by":"crossref","unstructured":"Veleva, P.: Personal data security for smart systems and devises with remote access. EBSCOhost (2019)","DOI":"10.15547\/tjs.2019.s.01.144"},{"key":"11_CR99","unstructured":"Virtualization Market Now \u2018Mature,\u2019 Gartner Finds: InformationWeek. https:\/\/www.informationweek.com\/cloud\/infrastructure-as-a-service\/virtualization-market-now-mature-gartner-finds\/d\/d-id\/1325529 . Accessed 13 Dec 2019"},{"key":"11_CR100","unstructured":"Reasons Behind Storage Virtualization Software Use 2015: Statista. https:\/\/www.statista.com\/statistics\/678925\/worldwide-storage-virtualization-software-use-reasons\/ . Accessed 13 Dec 2019"},{"key":"11_CR101","unstructured":"Liu, S.: Global data storage problems 2016\u20132017. Statista. https:\/\/www.statista.com\/statistics\/752840\/worldwide-data-storage-problems\/ . Accessed 13 Dec 2019"},{"key":"11_CR102","doi-asserted-by":"crossref","unstructured":"ENISA Threat Landscape Report 2018. https:\/\/www.enisa.europa.eu\/publications\/enisa-threat-landscape-report-2018 . Accessed 13 Dec 2019","DOI":"10.1016\/S1361-3723(18)30050-2"},{"key":"11_CR103","unstructured":"DiGiacomo, J.: Active vs passive cyber attacks explained. Revision Legal, 14 February 2017. https:\/\/revisionlegal.com\/cyber-security\/active-passive-cyber-attacks-explained\/ . Accessed 22 Dec 2019"},{"key":"11_CR104","unstructured":"CMS: HIPAA basics for providers: privacy, security, and breach notification rules. CMS (September 2018)"},{"key":"11_CR105","unstructured":"U.S. Department of Health & Human Services - Office for Civil Rights. https:\/\/ocrportal.hhs.gov\/ocr\/breach\/breach_report.jsf . Accessed 21 Dec 2019"},{"key":"11_CR106","unstructured":"O\u2019Neil, C.: Opinion: big-data algorithms are manipulating us all. Wired, 18 October 2016"}],"container-title":["Advances in Intelligent Systems and Computing","National Cyber Summit (NCS) Research Track 2020"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-58703-1_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,3,31]],"date-time":"2021-03-31T09:10:28Z","timestamp":1617181828000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-58703-1_11"}},"subtitle":["Isolating the CIA Triad Components to Identify Gaps to Security"],"short-title":[],"issued":{"date-parts":[[2020,9,9]]},"ISBN":["9783030587024","9783030587031"],"references-count":106,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-58703-1_11","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"value":"2194-5357","type":"print"},{"value":"2194-5365","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,9,9]]},"assertion":[{"value":"9 September 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"NCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"National Cyber Summit","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Huntsville, AL","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 June 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 June 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ncs2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.nationalcybersummit.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}