Cyber Attack Trends Data
Government & Civic Records
Tags and Keywords
Trusted By




"No reviews yet"
Free
About
This dataset compiles information on cyber security data breaches, primarily focusing on incidents involving the theft or compromise of 30,000 or more records. It draws data from various sources, including press reports, government news releases, and mainstream news articles. The dataset's purpose is to illuminate which organisations are most vulnerable and the common methods employed in breaches, thereby aiding future prevention efforts. It can also be used to identify patterns in breach occurrences and their impact.
Columns
- Entity: The name of the organisation that experienced the breach. (String)
- Year: The year in which the breach took place. (Integer)
- Records: The quantity of records compromised during the breach. (Integer)
- Organisation type: The classification of the organisation that was breached. (String)
- Method: The technique or approach used to breach the organisation. (String)
- Sources: The origins from which the data was gathered. (String)
Distribution
The dataset is available as a CSV file, specifically named
df_1.csv
, with a file size of 23.27 kB. It contains 30,000 records of cyber security data breaches, with 352 valid entries across most columns. This dataset is not expected to receive future updates.Usage
This dataset offers several applications, including:
- Understanding which types of organisations are most frequently breached and the predominant breach methods.
- Analysing data for trends or patterns in when and how breaches occur.
- Creating visualisations or infographics to illustrate the prevalence of data breaches.
- Studying the effect of data breaches on organisational reputation and customer trust.
- Allowing organisations to benchmark their security measures against those of similar entities that have experienced breaches.
Coverage
The dataset focuses on data breaches involving 30,000 or more records, noting that numerous smaller breaches occur but are not included. The 'Year' column indicates the time range, with 22 unique years represented; 2011 and 2020 are among the most common years for reported incidents. While the dataset does not explicitly list geographical locations, it can be used to identify trends related to geographical distribution. Some entries in the 'Records' and 'Sources' columns have missing values (1% each), and the 'Method' column has a negligible number of missing entries.
License
CC0- Public Domain
Who Can Use It
This dataset is valuable for:
- Organisations of all sizes: To assess their risk posture and improve security measures.
- Cybersecurity analysts and researchers: To identify trends, methods, and patterns in data breaches.
- Data scientists and visualisers: To create informative displays of breach data.
- Risk management professionals: To understand the potential impact of breaches on reputation and trust.
- Security teams: For benchmarking their own defences against reported incidents.
Dataset Name Suggestions
- Cybersecurity Breach Records
- Global Data Breach Incidents
- Organisational Security Breaches
- Cyber Attack Trends Data
Attributes
Original Data Source: Cyber Attack Trends Data