SlideShare a Scribd company logo
1 of 12
Search for..?
• Member name
• Date of birth
• Social Security number
• Member identification
number
• Email address
• Mailing and/or physical address
• Telephone number
• Banking account number
• Clinical information
• Claims information
Research
Establish
Contact
Attack
Exfiltration
Target..?
• Social media users
• Banks
• Organizations/corporations
• Intelligence agencies of countries
Why..
• Happens due to internal & external threats like…
• Old, Unpatched Security Vulnerabilities
• Cyber criminals
• Human Error
• Malware
• Insider Misuse
• Physical Theft of a Data-Carrying Device
Real Cases
• Yahoo
• Biggest breach in the internet era
• 3 billion accounts hacked comprised by 2013
• ebay
• 145 million users were asked to change passwords along with other personal
information
• Breach was reported by employees and not customers themselves
• Equifax
• Putting the data of over 143 million Americans and many people in other
countries at risk.
• Several hundred thousands identities were stolen
• FACEBOOK:
A huge political scandal in early 2018 when it was revealed that Cambridge
analytica had harvested the data of millions of people without their consent for
political purposes.
• Uber
• Hackers accessed names, Emails, contacts & license plate numbers of about
57 million drivers & customers n October 2016.
• Company paid $100,000 to prevent hackers from using the data & keep the
breach under wraps.
Preventions..?
• Protect Information
• Reduce transfer of data
• Restrict download
• Shred files
• Ban unencrypted devices
• Secure transfer
• Good password
Cont’d
• Automate security
• Identify threats
• Monitor data leakage
• Track data
• Define accessibility
• Security training
• Stop incursion
• Breach response

More Related Content

What's hot

Network security unit 1,2,3
Network security unit 1,2,3 Network security unit 1,2,3
Network security unit 1,2,3 WE-IT TUTORIALS
 
Web App Security Presentation by Ryan Holland - 05-31-2017
Web App Security Presentation by Ryan Holland - 05-31-2017Web App Security Presentation by Ryan Holland - 05-31-2017
Web App Security Presentation by Ryan Holland - 05-31-2017TriNimbus
 
Ransomware Attack.pptx
Ransomware Attack.pptxRansomware Attack.pptx
Ransomware Attack.pptxIkramSabir4
 
Example of access control
Example of access controlExample of access control
Example of access controlHafiza Abas
 
So You Want a Job in Cybersecurity
So You Want a Job in CybersecuritySo You Want a Job in Cybersecurity
So You Want a Job in CybersecurityTeri Radichel
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its PreventionDinesh O Bareja
 
cyber security,need,security problem and types of cyber security
cyber security,need,security problem and types of cyber securitycyber security,need,security problem and types of cyber security
cyber security,need,security problem and types of cyber securityVansh Bathla
 
Best Cyber Security Projects | The Knowledge Academy
Best Cyber Security Projects | The Knowledge Academy Best Cyber Security Projects | The Knowledge Academy
Best Cyber Security Projects | The Knowledge Academy The Knowledge Academy
 
Basic paralegal skills
Basic paralegal skillsBasic paralegal skills
Basic paralegal skillsMcypp Ncmf
 
Cyber crime types
Cyber crime typesCyber crime types
Cyber crime typeskiran yadav
 
Social media and Security: How to Ensure Safe Social Networking
Social media and Security: How to Ensure Safe Social NetworkingSocial media and Security: How to Ensure Safe Social Networking
Social media and Security: How to Ensure Safe Social NetworkingIshfaq Majid
 
Presentation on cyber crime
Presentation on cyber crimePresentation on cyber crime
Presentation on cyber crimeDevanshi Solanki
 

What's hot (20)

Network security unit 1,2,3
Network security unit 1,2,3 Network security unit 1,2,3
Network security unit 1,2,3
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Web App Security Presentation by Ryan Holland - 05-31-2017
Web App Security Presentation by Ryan Holland - 05-31-2017Web App Security Presentation by Ryan Holland - 05-31-2017
Web App Security Presentation by Ryan Holland - 05-31-2017
 
Ransomware Attack.pptx
Ransomware Attack.pptxRansomware Attack.pptx
Ransomware Attack.pptx
 
Example of access control
Example of access controlExample of access control
Example of access control
 
So You Want a Job in Cybersecurity
So You Want a Job in CybersecuritySo You Want a Job in Cybersecurity
So You Want a Job in Cybersecurity
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its Prevention
 
Web security
Web securityWeb security
Web security
 
Cyber crime ppt
Cyber crime  pptCyber crime  ppt
Cyber crime ppt
 
The Dark Web
The Dark WebThe Dark Web
The Dark Web
 
cyber security,need,security problem and types of cyber security
cyber security,need,security problem and types of cyber securitycyber security,need,security problem and types of cyber security
cyber security,need,security problem and types of cyber security
 
Privacy in the Digital Age
Privacy in the Digital AgePrivacy in the Digital Age
Privacy in the Digital Age
 
Best Cyber Security Projects | The Knowledge Academy
Best Cyber Security Projects | The Knowledge Academy Best Cyber Security Projects | The Knowledge Academy
Best Cyber Security Projects | The Knowledge Academy
 
Domain Dispute Presentation
Domain Dispute PresentationDomain Dispute Presentation
Domain Dispute Presentation
 
Basic paralegal skills
Basic paralegal skillsBasic paralegal skills
Basic paralegal skills
 
Ransomware
RansomwareRansomware
Ransomware
 
Cyber crime types
Cyber crime typesCyber crime types
Cyber crime types
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Social media and Security: How to Ensure Safe Social Networking
Social media and Security: How to Ensure Safe Social NetworkingSocial media and Security: How to Ensure Safe Social Networking
Social media and Security: How to Ensure Safe Social Networking
 
Presentation on cyber crime
Presentation on cyber crimePresentation on cyber crime
Presentation on cyber crime
 

Similar to Data Breach

A delightful way to teach kids about computers
A delightful way to teach kids about computersA delightful way to teach kids about computers
A delightful way to teach kids about computers806670
 
Identity thefts
Identity theftsIdentity thefts
Identity theftsHHSome
 
PROTECTION PERSONAL PRIVACY
PROTECTION PERSONAL PRIVACYPROTECTION PERSONAL PRIVACY
PROTECTION PERSONAL PRIVACYDoubleXDS
 
Protecting Personal Privacy
Protecting Personal PrivacyProtecting Personal Privacy
Protecting Personal PrivacyDoubleXDS
 
Hacker risks presentation to ACFE PR Chapter
Hacker risks presentation to ACFE PR ChapterHacker risks presentation to ACFE PR Chapter
Hacker risks presentation to ACFE PR ChapterJose L. Quiñones-Borrero
 
Cyber Security Awareness October 2014
Cyber Security Awareness October 2014Cyber Security Awareness October 2014
Cyber Security Awareness October 2014Donald E. Hester
 
Cybercrimes and Cybercriminals
Cybercrimes and CybercriminalsCybercrimes and Cybercriminals
Cybercrimes and CybercriminalsAshikur Rahman
 
GROUP 4-final presentation.pptx. in TLE
GROUP  4-final presentation.pptx. in TLEGROUP  4-final presentation.pptx. in TLE
GROUP 4-final presentation.pptx. in TLEmenezachristal
 
Identity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullyingIdentity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullyingMatt Smith
 
2018-05-14 Digital Misconduct and Digital Altruism in the United States
2018-05-14 Digital Misconduct and Digital Altruism in the United States2018-05-14 Digital Misconduct and Digital Altruism in the United States
2018-05-14 Digital Misconduct and Digital Altruism in the United StatesFrederick Lane
 
New Revenue Streams for Identity Theft
New Revenue Streams for Identity TheftNew Revenue Streams for Identity Theft
New Revenue Streams for Identity Theftbmwlaw
 
Kasita's presentation
Kasita's presentationKasita's presentation
Kasita's presentationChande Kasita
 
Identity Theft: How to Avoid It
Identity Theft: How to Avoid ItIdentity Theft: How to Avoid It
Identity Theft: How to Avoid Ithewie
 
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter StyleCybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter StyleBrian Pichman
 

Similar to Data Breach (20)

A delightful way to teach kids about computers
A delightful way to teach kids about computersA delightful way to teach kids about computers
A delightful way to teach kids about computers
 
Identity thefts
Identity theftsIdentity thefts
Identity thefts
 
PROTECTION PERSONAL PRIVACY
PROTECTION PERSONAL PRIVACYPROTECTION PERSONAL PRIVACY
PROTECTION PERSONAL PRIVACY
 
Protecting Personal Privacy
Protecting Personal PrivacyProtecting Personal Privacy
Protecting Personal Privacy
 
Hacker risks presentation to ACFE PR Chapter
Hacker risks presentation to ACFE PR ChapterHacker risks presentation to ACFE PR Chapter
Hacker risks presentation to ACFE PR Chapter
 
Cyber Security Awareness October 2014
Cyber Security Awareness October 2014Cyber Security Awareness October 2014
Cyber Security Awareness October 2014
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Social Media - Not Just for Marketing
Social Media - Not Just for MarketingSocial Media - Not Just for Marketing
Social Media - Not Just for Marketing
 
Cybercrimes and Cybercriminals
Cybercrimes and CybercriminalsCybercrimes and Cybercriminals
Cybercrimes and Cybercriminals
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
What is data privacy?
What is data privacy?What is data privacy?
What is data privacy?
 
GROUP 4-final presentation.pptx. in TLE
GROUP  4-final presentation.pptx. in TLEGROUP  4-final presentation.pptx. in TLE
GROUP 4-final presentation.pptx. in TLE
 
Identity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullyingIdentity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullying
 
2018-05-14 Digital Misconduct and Digital Altruism in the United States
2018-05-14 Digital Misconduct and Digital Altruism in the United States2018-05-14 Digital Misconduct and Digital Altruism in the United States
2018-05-14 Digital Misconduct and Digital Altruism in the United States
 
Osint part 1_personal_privacy
Osint part 1_personal_privacyOsint part 1_personal_privacy
Osint part 1_personal_privacy
 
New Revenue Streams for Identity Theft
New Revenue Streams for Identity TheftNew Revenue Streams for Identity Theft
New Revenue Streams for Identity Theft
 
Kasita's presentation
Kasita's presentationKasita's presentation
Kasita's presentation
 
IT Security Awareness Posters
IT Security Awareness PostersIT Security Awareness Posters
IT Security Awareness Posters
 
Identity Theft: How to Avoid It
Identity Theft: How to Avoid ItIdentity Theft: How to Avoid It
Identity Theft: How to Avoid It
 
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter StyleCybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
 

More from Kinza Erum

Libya & Tunisia
Libya & TunisiaLibya & Tunisia
Libya & TunisiaKinza Erum
 
Sweden and Covid-19
Sweden and Covid-19Sweden and Covid-19
Sweden and Covid-19Kinza Erum
 
Environment conventions
Environment conventionsEnvironment conventions
Environment conventionsKinza Erum
 
Consumer learning
Consumer learningConsumer learning
Consumer learningKinza Erum
 
BANKING INDUSTRY MELTDOWN - THE ETHICAL AND FINANCIAL RISKS OF DERIVATIVES
BANKING INDUSTRY MELTDOWN - THE ETHICAL AND FINANCIAL RISKS OF DERIVATIVESBANKING INDUSTRY MELTDOWN - THE ETHICAL AND FINANCIAL RISKS OF DERIVATIVES
BANKING INDUSTRY MELTDOWN - THE ETHICAL AND FINANCIAL RISKS OF DERIVATIVESKinza Erum
 
Generation Z and the workplace
Generation Z and the workplaceGeneration Z and the workplace
Generation Z and the workplaceKinza Erum
 
Rija Fashions Textile Exports Company
Rija Fashions Textile Exports CompanyRija Fashions Textile Exports Company
Rija Fashions Textile Exports CompanyKinza Erum
 
Human Resource Management
Human Resource ManagementHuman Resource Management
Human Resource ManagementKinza Erum
 
Fallacy Appeal to force
Fallacy Appeal to force Fallacy Appeal to force
Fallacy Appeal to force Kinza Erum
 

More from Kinza Erum (11)

Libya & Tunisia
Libya & TunisiaLibya & Tunisia
Libya & Tunisia
 
Sweden and Covid-19
Sweden and Covid-19Sweden and Covid-19
Sweden and Covid-19
 
Environment conventions
Environment conventionsEnvironment conventions
Environment conventions
 
Consumer learning
Consumer learningConsumer learning
Consumer learning
 
BANKING INDUSTRY MELTDOWN - THE ETHICAL AND FINANCIAL RISKS OF DERIVATIVES
BANKING INDUSTRY MELTDOWN - THE ETHICAL AND FINANCIAL RISKS OF DERIVATIVESBANKING INDUSTRY MELTDOWN - THE ETHICAL AND FINANCIAL RISKS OF DERIVATIVES
BANKING INDUSTRY MELTDOWN - THE ETHICAL AND FINANCIAL RISKS OF DERIVATIVES
 
Generation Z and the workplace
Generation Z and the workplaceGeneration Z and the workplace
Generation Z and the workplace
 
Rija Fashions Textile Exports Company
Rija Fashions Textile Exports CompanyRija Fashions Textile Exports Company
Rija Fashions Textile Exports Company
 
Cab @ tap
Cab @ tapCab @ tap
Cab @ tap
 
Human Resource Management
Human Resource ManagementHuman Resource Management
Human Resource Management
 
Peer Pressure
Peer PressurePeer Pressure
Peer Pressure
 
Fallacy Appeal to force
Fallacy Appeal to force Fallacy Appeal to force
Fallacy Appeal to force
 

Recently uploaded

Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 

Recently uploaded (20)

Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 

Data Breach

  • 1.
  • 2.
  • 3.
  • 4. Search for..? • Member name • Date of birth • Social Security number • Member identification number • Email address • Mailing and/or physical address • Telephone number • Banking account number • Clinical information • Claims information
  • 6. Target..? • Social media users • Banks • Organizations/corporations • Intelligence agencies of countries
  • 7. Why.. • Happens due to internal & external threats like… • Old, Unpatched Security Vulnerabilities • Cyber criminals • Human Error • Malware • Insider Misuse • Physical Theft of a Data-Carrying Device
  • 8.
  • 9. Real Cases • Yahoo • Biggest breach in the internet era • 3 billion accounts hacked comprised by 2013 • ebay • 145 million users were asked to change passwords along with other personal information • Breach was reported by employees and not customers themselves • Equifax • Putting the data of over 143 million Americans and many people in other countries at risk. • Several hundred thousands identities were stolen
  • 10. • FACEBOOK: A huge political scandal in early 2018 when it was revealed that Cambridge analytica had harvested the data of millions of people without their consent for political purposes. • Uber • Hackers accessed names, Emails, contacts & license plate numbers of about 57 million drivers & customers n October 2016. • Company paid $100,000 to prevent hackers from using the data & keep the breach under wraps.
  • 11. Preventions..? • Protect Information • Reduce transfer of data • Restrict download • Shred files • Ban unencrypted devices • Secure transfer • Good password
  • 12. Cont’d • Automate security • Identify threats • Monitor data leakage • Track data • Define accessibility • Security training • Stop incursion • Breach response