Created Date : 15-09-2020
Created by : Annamalai
Data Breach :
A data breach is an incident that exposes confidential or protected information. ... A data breach can be intentional or accidental. A cybercriminal may hack the database of a company where you've shared your personal information.
A data breach is the intentional or unintentional release of secure or private/confidential information to an untrusted environment. Other terms for this phenomenon include unintentional information disclosure, data leak, information leakage and also data spill.
Impacts of data breach:
A data breach occurs when a cybercriminal successfully infiltrates a data source and extracts sensitive information. This can be done physically by accessing a computer or network to steal local files or by bypassing network security remotely. The latter is often the method used to target companies.
Sure, gaining access to information like names, email addresses, and passwords might not seem as harmful as someone having your Social Security number. But any data breach can leave you at risk of identity theft if the hackers want to use that information against you.
How do you handle a data breach?
Here are some steps that should always be included:
Stop the breach
Assess the damage
Notify those affected
Update your recovery plan to prepare for future attacks
Train your employees
Protect the data
Enforce strong passwords
Example of a data breach :
Examples of a breach might include: loss or theft of hard copy notes, USB drives, computers or mobile devices. an unauthorised person gaining access to your laptop, email account or computer network. sending an email with personal data to the wrong person.
What Kind of information is stolen:
Bank account numbers
Social Security numbers
Usernames and passwords
Preventing a Data Breach:
Keep Only What You Need. Inventory the type and quantity of information in your files and on your computers
Destroy Before Disposal
Control Computer Usage
Secure All Computers
Keep Security Software Up-To-Date
5 of the Biggest Computer Hacks in History:
Operation Shady RAT. A computer programmer based in the People's Republic of China is assumed to be responsible for these continuing cyber attacks that first began in 2006
Department Of Defense Hack
Play Station Network Hack
Here are the four major types of breaches you need to protect your business against:
Ransomware. Ransomware attacks occur when a hacker takes your data hostage in exchange for a payment
Malware. Malware is a more general term that includes attacks like spyware and viruses
Denial of Service (DoS)