SlideShare a Scribd company logo
1 of 17
DATA BREACH
Abstract
Many security breaches we saw in the past few years and how it affect the
number of businesses it include large and small businesses. We will study
what is breach and how it will effect on our business and what are the main
causes of it. Why social media account is harm for us and how the largest
organizations got breached and how would we stop to get breach our data.
Our main target Is related to business it could be small or large business. We
will discuss that how companies got lost their reputation because of data
breach and how much companies got loss of money it include the
organization that we all are known about it like Facebook.
DATA BREACH
Introduction
A data breach is an incident where data is stole or access by unauthorized
person. It can harm many businesses and organizations. The stolen data may
have the information about credit cards number, customer data or matter of
national security. The cases of data breaches rapidly increases in 2013 Sony
Pictures became a victim by hackers and leaked their unreleased movies and
they got loss 8million$. In 2015 the most famous HBO TV series Game of
Thrones season 5 First 5 episode was leaked and they got loss of 50million$.
News of prominent information ruptures show up every now and again in the
media. In late 2013, Target endured a huge information break where the
charge card data of 44 million clients and the individual data of 71 million
extra clients was stolen, prompting a sharp decrease in deals and stock costs
and the acquiescence of its CEO.
DATA BREACH
Essentially, the 2014 cyber-attack of Sony Pictures, supposedly by North
Korea, released individual data of a huge number of its workers, duplicates of
then-unreleased movies, and other corporate data; among different harms the
organization needed to pay $6 million to settle hack claims with
representatives. The most of the data breaches done in the year between
2005 to 2017 there are round about 919228822 records were breached.
There is mostly done by hackers. The data breach report in 2016 is 40%
higher than 2015. There were 4.2 million data of government employees were
stolen in 2015. These cases are rapidly increases by the passing years in
Pakistan there are 20000 debits and credit cards from 22 Pakistanis bank
were hack by using skimming tools. Skimming tools are basically use in ATM
machine not by bank the hackers place them cleverly and the common
person don’t know about it. The skimming tool easily scans the card data and
stored in the memory chip.
DATA BREACH
Insider person
Data leak by company employee or any family member.
Payment card fraud
Payment card is stolen or crack by skimming devices.
Human mistake
Through mistaken the sensitive data is exposed.
DATA BREACH
Data Breach Impact on Small Business
We have observed in the past some year that data breach mostly effect on
small business.2 months ago HR Daily Adviser had to chance to interview
with Jim Anderson the IT consultant of switch fast. So the question was
when the small businesses suffer from data breach and they won’t able to
run business after the data breach and when the big companies have that
issue then nothing happen so what is the difference.
Anderson: when cyber-attack hit the small businesses they have very low
resources as compare to the large business mostly they don’t have the
proper tools to resist the hackers. When we talk about the large business
they have the proper tools, money and manpower so that’s why they can’t
bounce back.
DATA BREACH
Buyers who utilize their installment cards at your foundation put an abnormal
state of trust in your business, also, that trust can be broken with only one
rupture occasion. In Organization examine on breach notice, 57% of the
general population who had gotten a breach notice letter from a business said
they lost trust and certainty in the association. More terrible, 31% of those
over viewed said they ended their association with the capable organization.
Think about, seventy five percent of the administrators whose organizations
had encountered a client information break said the occasion had a critical or
moderate effect on the business.
DATA BREACH
Data Breaches
Small Business
Large Business
Data breach in small & large business
DATA BREACH
Causes of Data Breaches
1) weak passwords
It is the most common cause of data stolen when you use weak password
or you lost your password. The hackers attack and easily crack your data.
The simple solution is to use complex passwords.
2) Back Doors
Back door the application which is very low level or poorly implanted.
Hackers always love attack this types of applications. Because this type of
application always leave a hole for hacker.
3) Malware
It is a type of virus that mostly hacker used which make hacker able to
access your system. It is mostly attached with emails and local websites.
DATA BREACH
4) Insider Threats
When you give too many permission to employees to access data. Then
there is a chance to breach your data.
5) Physical Attack
Physical attack means somebody stole your data or someone approach to
your system and get your data.
DATA BREACH
0%
5%
10%
15%
20%
25%
30%
35%
40%
45%
50%
Hacking
Malware
Errors
social attack
physical action
Hacking Malware Errors social attack physical action
Series 1 49% 30% 17% 11% 9%
DATA BREACH
Social sites and browsers Breach Impact on Business
Social sites breach can harm your business if the hacker hack your social
account and there is many information about your company you send through
social media account and there is chance that your social account password
and your company system password are same then there is chance that you
will lose everything. Such an information break can massively affect an
organization. No internet based life security methodology is finished without
representative preparing in how to abstain from turning into the casualty of a
social building assault.
As we disuse about the malware software that hacker mostly used in social
sites it is attaches with different types of link and send to the target person
whom they want to hack. If that person open that link then that person
automatically download the malware software which will harm his system and
the hacker will access his system with the help of malware software. Malware
and infections can be somewhat badly arranged to end clients and may, in
the most pessimistic scenario, result in fraud. For the undertaking, be that as
it may, the results can be considerably more extreme.
DATA BREACH
Modern browser allow user to use web view in mobile application It stores the
user personal information of user and log in password etc. Basically web
browser stores the information of cookies, cache and passwords. The store
information is always privacy concern. Now mostly browsers introduce the
private mode that doesn’t create history. It is supported by Mozilla Firefox,
Google chrome and UC browser. The private browser mode is very useful for
the user firstly it don’t create history and cookies and for the hacker it is
difficult to remote that person information. Browser breach has a huge impact
on the companies. For example there is many customers that search about
Samsung company and what they want from that company what they have
complaint about that company so the others companies will target that type of
customer who want some advance features on mobile and that they provides
so they pursue them to buy the product of their company. But the private
mode is little bit harder for the companies if someone search about any
company in the private browser mode so it don’t store the cookies and the
company websites admin don’t know that what people want and what are
they searched.
DATA BREACH
weak password back doors malware
insider threads physical attack other
Breaches attack
DATA BREACH
Top Data Breaches of all time
Instagram
It is one of the famous social site around the world about 1billion people are
using this social site. It was attack in the 2017 the 6 million user data was
breaches it includes email, phone number, addresses and other personal
details. It was hacked.
Yahoo
It is an internet service company that provides a web browser. The breach
was occurred in 2013 and discovered in the end of 2016. It is the biggest
breach in yahoo history. There are round about 1billion people data. The
includes password and other details.
Facebook
It is the world largest social site everyone knows that about the functionality of
Facebook. In this site there are billions of people are registered. In 2018 the
Facebook got hacked and 187 million people data got breached.
DATA BREACH
Data breach security strategy
Give the complete training to the staff to fill the gap. Use the security awareness training. To
make the employees aware of everything.
2) Email or malware attack
Install and regular update the antivirus don’t open the emails that you don’t know the sender.
Give the basic security training to the every data base handler employee.
3) Prevent to use same password
Do not use the same password every login it include social sites. Because if there is one
password encrypt by the hackers there would be a chance to hacker harm your other account.
1) Reconnaissance
DATA BREACH
Data breach security strategy
In case of data stolen then quickly response to the customers to change their passwords. And
always use clone devices to store data on it.
5) Use employee credentials
Just allow the access of some employee access to the portal for this use employee credential so
the others would not access the portal data base.
4) Data stolen case
DATA BREACH
Conclusion
The case of data braches increases rapidly year by year Which effect the
businesses very badly there should be a proper model to calculate the cost of
data breaches includes the strong measurable capabilities.
In this paper we discuss how breaches affect the businesses and how it
impact on the people. The study is about small and large businesses. After
study the paper include that small businesses effect in large number as
compare to the large businesses. Then we study that in what causes data
can breach there is a lot of reason we discuss some reason how it effect any
organization and discuss the ration of main causes effect the business. After
that we discuss that how social sites and browsers effect the business and
how much data leakage on social sites and browsers then we study the top
data breaches of the century and the reason behind it and what number of
data it include. At the end we discuss how prevent data braches and write the
popular attack and their controls. After study the paper you will be able to
know that what is data breach and how it affects us and how to stop it.

More Related Content

What's hot

cyber security presentation.pptx
cyber security presentation.pptxcyber security presentation.pptx
cyber security presentation.pptxkishore golla
 
“Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation “Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation tomasztopa
 
Social engineering
Social engineeringSocial engineering
Social engineeringVishal Kumar
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITYAhmed Moussa
 
VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing Netpluz Asia Pte Ltd
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpointgalaxy201
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and SolutionsColin058
 
Privacy issues and internet privacy
Privacy issues and internet privacyPrivacy issues and internet privacy
Privacy issues and internet privacyvinyas87
 
Social engineering-Attack of the Human Behavior
Social engineering-Attack of the Human BehaviorSocial engineering-Attack of the Human Behavior
Social engineering-Attack of the Human BehaviorJames Krusic
 
Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...
Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...
Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...Okan YILDIZ
 
Cyber Security Best Practices
Cyber Security Best PracticesCyber Security Best Practices
Cyber Security Best PracticesEvolve IP
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security AwarenessRamiro Cid
 
Cyber Security Introduction.pptx
Cyber Security Introduction.pptxCyber Security Introduction.pptx
Cyber Security Introduction.pptxANIKETKUMARSHARMA3
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptOoXair
 
Mobile protection
Mobile protection Mobile protection
Mobile protection preetpatel72
 

What's hot (20)

cyber security presentation.pptx
cyber security presentation.pptxcyber security presentation.pptx
cyber security presentation.pptx
 
“Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation “Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Security threats
Security threatsSecurity threats
Security threats
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
 
VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpoint
 
Data security
Data securityData security
Data security
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Social engineering
Social engineering Social engineering
Social engineering
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 
Privacy issues and internet privacy
Privacy issues and internet privacyPrivacy issues and internet privacy
Privacy issues and internet privacy
 
Social engineering-Attack of the Human Behavior
Social engineering-Attack of the Human BehaviorSocial engineering-Attack of the Human Behavior
Social engineering-Attack of the Human Behavior
 
Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...
Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...
Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...
 
Cyber Security Best Practices
Cyber Security Best PracticesCyber Security Best Practices
Cyber Security Best Practices
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Cyber Security Introduction.pptx
Cyber Security Introduction.pptxCyber Security Introduction.pptx
Cyber Security Introduction.pptx
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.ppt
 
Mobile protection
Mobile protection Mobile protection
Mobile protection
 

Similar to Data breach

Five cyber threats to be careful in 2018
Five cyber threats to be careful in 2018Five cyber threats to be careful in 2018
Five cyber threats to be careful in 2018Ronak Jain
 
5 Technology Trends Construction Contractors Can't Afford To Ignore
5 Technology Trends Construction Contractors Can't Afford To Ignore5 Technology Trends Construction Contractors Can't Afford To Ignore
5 Technology Trends Construction Contractors Can't Afford To IgnoreGross, Mendelsohn & Associates
 
Info Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study JamsInfo Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study JamsGDSCCVR
 
Crimes in digital marketing..pptx
Crimes in digital marketing..pptxCrimes in digital marketing..pptx
Crimes in digital marketing..pptxRajviNikeetaRathore
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationJamie Proctor-Brassard
 
Case 11. What exactly occurred Twitter is one of popular soci.docx
Case 11. What exactly occurred Twitter is one of popular soci.docxCase 11. What exactly occurred Twitter is one of popular soci.docx
Case 11. What exactly occurred Twitter is one of popular soci.docxtidwellveronique
 
Top Positive and Negative Impacts of AI & ML on Cybersecurity
Top Positive and Negative Impacts of AI & ML on CybersecurityTop Positive and Negative Impacts of AI & ML on Cybersecurity
Top Positive and Negative Impacts of AI & ML on CybersecurityPixel Crayons
 
ConnXus myCBC Webinar Series: Cybersecurity Risks to Your Business
ConnXus myCBC Webinar Series: Cybersecurity Risks to Your BusinessConnXus myCBC Webinar Series: Cybersecurity Risks to Your Business
ConnXus myCBC Webinar Series: Cybersecurity Risks to Your BusinessConnXus
 
pypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjr
pypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjrpypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjr
pypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjrSurajGurushetti
 
AI And Cyber-security Threats
AI And Cyber-security ThreatsAI And Cyber-security Threats
AI And Cyber-security ThreatsSpotle.ai
 
Final Presentation.pptx
Final Presentation.pptxFinal Presentation.pptx
Final Presentation.pptxBetaBeta9
 
A Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.comA Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.comBusiness.com
 
ImageQuest_Newsletter_July_Milton copy
ImageQuest_Newsletter_July_Milton copyImageQuest_Newsletter_July_Milton copy
ImageQuest_Newsletter_July_Milton copyAlisa Alvich
 
Verizon 2014 data breach investigation report and the target breach
Verizon 2014 data breach investigation report and the target breachVerizon 2014 data breach investigation report and the target breach
Verizon 2014 data breach investigation report and the target breachUlf Mattsson
 
The CISO’s Guide to Being Human
The CISO’s Guide to Being HumanThe CISO’s Guide to Being Human
The CISO’s Guide to Being HumanClearswift
 
Safeguarding PeopleSoft Against Direct Deposit Theft
Safeguarding PeopleSoft Against Direct Deposit TheftSafeguarding PeopleSoft Against Direct Deposit Theft
Safeguarding PeopleSoft Against Direct Deposit TheftAppsian
 
Technological Threats to Businesses (Independent Study)
Technological Threats to Businesses (Independent Study)Technological Threats to Businesses (Independent Study)
Technological Threats to Businesses (Independent Study)Gerard Keenan
 
Home cyber security
Home cyber securityHome cyber security
Home cyber securityMichael File
 
The Internet is a dog-eat-dog world and your app is clad in Milk Bone underwear
The Internet is a dog-eat-dog world and your app is clad in Milk Bone underwearThe Internet is a dog-eat-dog world and your app is clad in Milk Bone underwear
The Internet is a dog-eat-dog world and your app is clad in Milk Bone underwearIronCore Labs
 

Similar to Data breach (20)

Five cyber threats to be careful in 2018
Five cyber threats to be careful in 2018Five cyber threats to be careful in 2018
Five cyber threats to be careful in 2018
 
5 Technology Trends Construction Contractors Can't Afford To Ignore
5 Technology Trends Construction Contractors Can't Afford To Ignore5 Technology Trends Construction Contractors Can't Afford To Ignore
5 Technology Trends Construction Contractors Can't Afford To Ignore
 
Info Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study JamsInfo Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study Jams
 
Crimes in digital marketing..pptx
Crimes in digital marketing..pptxCrimes in digital marketing..pptx
Crimes in digital marketing..pptx
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness Presentation
 
Case 11. What exactly occurred Twitter is one of popular soci.docx
Case 11. What exactly occurred Twitter is one of popular soci.docxCase 11. What exactly occurred Twitter is one of popular soci.docx
Case 11. What exactly occurred Twitter is one of popular soci.docx
 
Top Positive and Negative Impacts of AI & ML on Cybersecurity
Top Positive and Negative Impacts of AI & ML on CybersecurityTop Positive and Negative Impacts of AI & ML on Cybersecurity
Top Positive and Negative Impacts of AI & ML on Cybersecurity
 
ConnXus myCBC Webinar Series: Cybersecurity Risks to Your Business
ConnXus myCBC Webinar Series: Cybersecurity Risks to Your BusinessConnXus myCBC Webinar Series: Cybersecurity Risks to Your Business
ConnXus myCBC Webinar Series: Cybersecurity Risks to Your Business
 
pypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjr
pypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjrpypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjr
pypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjr
 
AI And Cyber-security Threats
AI And Cyber-security ThreatsAI And Cyber-security Threats
AI And Cyber-security Threats
 
Final Presentation.pptx
Final Presentation.pptxFinal Presentation.pptx
Final Presentation.pptx
 
A Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.comA Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.com
 
ImageQuest_Newsletter_July_Milton copy
ImageQuest_Newsletter_July_Milton copyImageQuest_Newsletter_July_Milton copy
ImageQuest_Newsletter_July_Milton copy
 
Verizon 2014 data breach investigation report and the target breach
Verizon 2014 data breach investigation report and the target breachVerizon 2014 data breach investigation report and the target breach
Verizon 2014 data breach investigation report and the target breach
 
Document-3.docx
Document-3.docxDocument-3.docx
Document-3.docx
 
The CISO’s Guide to Being Human
The CISO’s Guide to Being HumanThe CISO’s Guide to Being Human
The CISO’s Guide to Being Human
 
Safeguarding PeopleSoft Against Direct Deposit Theft
Safeguarding PeopleSoft Against Direct Deposit TheftSafeguarding PeopleSoft Against Direct Deposit Theft
Safeguarding PeopleSoft Against Direct Deposit Theft
 
Technological Threats to Businesses (Independent Study)
Technological Threats to Businesses (Independent Study)Technological Threats to Businesses (Independent Study)
Technological Threats to Businesses (Independent Study)
 
Home cyber security
Home cyber securityHome cyber security
Home cyber security
 
The Internet is a dog-eat-dog world and your app is clad in Milk Bone underwear
The Internet is a dog-eat-dog world and your app is clad in Milk Bone underwearThe Internet is a dog-eat-dog world and your app is clad in Milk Bone underwear
The Internet is a dog-eat-dog world and your app is clad in Milk Bone underwear
 

More from Burhan Ahmed

Wireless mobile communication
Wireless mobile communicationWireless mobile communication
Wireless mobile communicationBurhan Ahmed
 
Uses misuses and risk of software
Uses misuses and risk of softwareUses misuses and risk of software
Uses misuses and risk of softwareBurhan Ahmed
 
The distinction of prophet muhammad (s.a.w) among the teachers of moral conduct
The distinction of prophet muhammad (s.a.w) among the teachers of moral conductThe distinction of prophet muhammad (s.a.w) among the teachers of moral conduct
The distinction of prophet muhammad (s.a.w) among the teachers of moral conductBurhan Ahmed
 
Software house organization
Software house organizationSoftware house organization
Software house organizationBurhan Ahmed
 
Social interaction
Social interactionSocial interaction
Social interactionBurhan Ahmed
 
Planning work activities
Planning work activitiesPlanning work activities
Planning work activitiesBurhan Ahmed
 
Peripheral devices
Peripheral devicesPeripheral devices
Peripheral devicesBurhan Ahmed
 
Parallel computing and its applications
Parallel computing and its applicationsParallel computing and its applications
Parallel computing and its applicationsBurhan Ahmed
 
Operator overloading
Operator overloadingOperator overloading
Operator overloadingBurhan Ahmed
 
Job analysis and job design
Job analysis and job designJob analysis and job design
Job analysis and job designBurhan Ahmed
 
Intellectual property
Intellectual propertyIntellectual property
Intellectual propertyBurhan Ahmed
 

More from Burhan Ahmed (20)

Wireless mobile communication
Wireless mobile communicationWireless mobile communication
Wireless mobile communication
 
Virtual function
Virtual functionVirtual function
Virtual function
 
Uses misuses and risk of software
Uses misuses and risk of softwareUses misuses and risk of software
Uses misuses and risk of software
 
Types of computer
Types of computerTypes of computer
Types of computer
 
Trees
TreesTrees
Trees
 
Topology
TopologyTopology
Topology
 
The distinction of prophet muhammad (s.a.w) among the teachers of moral conduct
The distinction of prophet muhammad (s.a.w) among the teachers of moral conductThe distinction of prophet muhammad (s.a.w) among the teachers of moral conduct
The distinction of prophet muhammad (s.a.w) among the teachers of moral conduct
 
Software house organization
Software house organizationSoftware house organization
Software house organization
 
Social interaction
Social interactionSocial interaction
Social interaction
 
Role model
Role modelRole model
Role model
 
Rights and duties
Rights and dutiesRights and duties
Rights and duties
 
Planning work activities
Planning work activitiesPlanning work activities
Planning work activities
 
Peripheral devices
Peripheral devicesPeripheral devices
Peripheral devices
 
Parallel computing and its applications
Parallel computing and its applicationsParallel computing and its applications
Parallel computing and its applications
 
Operator overloading
Operator overloadingOperator overloading
Operator overloading
 
Normalization
NormalizationNormalization
Normalization
 
Managing strategy
Managing strategyManaging strategy
Managing strategy
 
Letter writing
Letter writingLetter writing
Letter writing
 
Job analysis and job design
Job analysis and job designJob analysis and job design
Job analysis and job design
 
Intellectual property
Intellectual propertyIntellectual property
Intellectual property
 

Recently uploaded

APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 

Recently uploaded (20)

9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 

Data breach

  • 1. DATA BREACH Abstract Many security breaches we saw in the past few years and how it affect the number of businesses it include large and small businesses. We will study what is breach and how it will effect on our business and what are the main causes of it. Why social media account is harm for us and how the largest organizations got breached and how would we stop to get breach our data. Our main target Is related to business it could be small or large business. We will discuss that how companies got lost their reputation because of data breach and how much companies got loss of money it include the organization that we all are known about it like Facebook.
  • 2. DATA BREACH Introduction A data breach is an incident where data is stole or access by unauthorized person. It can harm many businesses and organizations. The stolen data may have the information about credit cards number, customer data or matter of national security. The cases of data breaches rapidly increases in 2013 Sony Pictures became a victim by hackers and leaked their unreleased movies and they got loss 8million$. In 2015 the most famous HBO TV series Game of Thrones season 5 First 5 episode was leaked and they got loss of 50million$. News of prominent information ruptures show up every now and again in the media. In late 2013, Target endured a huge information break where the charge card data of 44 million clients and the individual data of 71 million extra clients was stolen, prompting a sharp decrease in deals and stock costs and the acquiescence of its CEO.
  • 3. DATA BREACH Essentially, the 2014 cyber-attack of Sony Pictures, supposedly by North Korea, released individual data of a huge number of its workers, duplicates of then-unreleased movies, and other corporate data; among different harms the organization needed to pay $6 million to settle hack claims with representatives. The most of the data breaches done in the year between 2005 to 2017 there are round about 919228822 records were breached. There is mostly done by hackers. The data breach report in 2016 is 40% higher than 2015. There were 4.2 million data of government employees were stolen in 2015. These cases are rapidly increases by the passing years in Pakistan there are 20000 debits and credit cards from 22 Pakistanis bank were hack by using skimming tools. Skimming tools are basically use in ATM machine not by bank the hackers place them cleverly and the common person don’t know about it. The skimming tool easily scans the card data and stored in the memory chip.
  • 4. DATA BREACH Insider person Data leak by company employee or any family member. Payment card fraud Payment card is stolen or crack by skimming devices. Human mistake Through mistaken the sensitive data is exposed.
  • 5. DATA BREACH Data Breach Impact on Small Business We have observed in the past some year that data breach mostly effect on small business.2 months ago HR Daily Adviser had to chance to interview with Jim Anderson the IT consultant of switch fast. So the question was when the small businesses suffer from data breach and they won’t able to run business after the data breach and when the big companies have that issue then nothing happen so what is the difference. Anderson: when cyber-attack hit the small businesses they have very low resources as compare to the large business mostly they don’t have the proper tools to resist the hackers. When we talk about the large business they have the proper tools, money and manpower so that’s why they can’t bounce back.
  • 6. DATA BREACH Buyers who utilize their installment cards at your foundation put an abnormal state of trust in your business, also, that trust can be broken with only one rupture occasion. In Organization examine on breach notice, 57% of the general population who had gotten a breach notice letter from a business said they lost trust and certainty in the association. More terrible, 31% of those over viewed said they ended their association with the capable organization. Think about, seventy five percent of the administrators whose organizations had encountered a client information break said the occasion had a critical or moderate effect on the business.
  • 7. DATA BREACH Data Breaches Small Business Large Business Data breach in small & large business
  • 8. DATA BREACH Causes of Data Breaches 1) weak passwords It is the most common cause of data stolen when you use weak password or you lost your password. The hackers attack and easily crack your data. The simple solution is to use complex passwords. 2) Back Doors Back door the application which is very low level or poorly implanted. Hackers always love attack this types of applications. Because this type of application always leave a hole for hacker. 3) Malware It is a type of virus that mostly hacker used which make hacker able to access your system. It is mostly attached with emails and local websites.
  • 9. DATA BREACH 4) Insider Threats When you give too many permission to employees to access data. Then there is a chance to breach your data. 5) Physical Attack Physical attack means somebody stole your data or someone approach to your system and get your data.
  • 10. DATA BREACH 0% 5% 10% 15% 20% 25% 30% 35% 40% 45% 50% Hacking Malware Errors social attack physical action Hacking Malware Errors social attack physical action Series 1 49% 30% 17% 11% 9%
  • 11. DATA BREACH Social sites and browsers Breach Impact on Business Social sites breach can harm your business if the hacker hack your social account and there is many information about your company you send through social media account and there is chance that your social account password and your company system password are same then there is chance that you will lose everything. Such an information break can massively affect an organization. No internet based life security methodology is finished without representative preparing in how to abstain from turning into the casualty of a social building assault. As we disuse about the malware software that hacker mostly used in social sites it is attaches with different types of link and send to the target person whom they want to hack. If that person open that link then that person automatically download the malware software which will harm his system and the hacker will access his system with the help of malware software. Malware and infections can be somewhat badly arranged to end clients and may, in the most pessimistic scenario, result in fraud. For the undertaking, be that as it may, the results can be considerably more extreme.
  • 12. DATA BREACH Modern browser allow user to use web view in mobile application It stores the user personal information of user and log in password etc. Basically web browser stores the information of cookies, cache and passwords. The store information is always privacy concern. Now mostly browsers introduce the private mode that doesn’t create history. It is supported by Mozilla Firefox, Google chrome and UC browser. The private browser mode is very useful for the user firstly it don’t create history and cookies and for the hacker it is difficult to remote that person information. Browser breach has a huge impact on the companies. For example there is many customers that search about Samsung company and what they want from that company what they have complaint about that company so the others companies will target that type of customer who want some advance features on mobile and that they provides so they pursue them to buy the product of their company. But the private mode is little bit harder for the companies if someone search about any company in the private browser mode so it don’t store the cookies and the company websites admin don’t know that what people want and what are they searched.
  • 13. DATA BREACH weak password back doors malware insider threads physical attack other Breaches attack
  • 14. DATA BREACH Top Data Breaches of all time Instagram It is one of the famous social site around the world about 1billion people are using this social site. It was attack in the 2017 the 6 million user data was breaches it includes email, phone number, addresses and other personal details. It was hacked. Yahoo It is an internet service company that provides a web browser. The breach was occurred in 2013 and discovered in the end of 2016. It is the biggest breach in yahoo history. There are round about 1billion people data. The includes password and other details. Facebook It is the world largest social site everyone knows that about the functionality of Facebook. In this site there are billions of people are registered. In 2018 the Facebook got hacked and 187 million people data got breached.
  • 15. DATA BREACH Data breach security strategy Give the complete training to the staff to fill the gap. Use the security awareness training. To make the employees aware of everything. 2) Email or malware attack Install and regular update the antivirus don’t open the emails that you don’t know the sender. Give the basic security training to the every data base handler employee. 3) Prevent to use same password Do not use the same password every login it include social sites. Because if there is one password encrypt by the hackers there would be a chance to hacker harm your other account. 1) Reconnaissance
  • 16. DATA BREACH Data breach security strategy In case of data stolen then quickly response to the customers to change their passwords. And always use clone devices to store data on it. 5) Use employee credentials Just allow the access of some employee access to the portal for this use employee credential so the others would not access the portal data base. 4) Data stolen case
  • 17. DATA BREACH Conclusion The case of data braches increases rapidly year by year Which effect the businesses very badly there should be a proper model to calculate the cost of data breaches includes the strong measurable capabilities. In this paper we discuss how breaches affect the businesses and how it impact on the people. The study is about small and large businesses. After study the paper include that small businesses effect in large number as compare to the large businesses. Then we study that in what causes data can breach there is a lot of reason we discuss some reason how it effect any organization and discuss the ration of main causes effect the business. After that we discuss that how social sites and browsers effect the business and how much data leakage on social sites and browsers then we study the top data breaches of the century and the reason behind it and what number of data it include. At the end we discuss how prevent data braches and write the popular attack and their controls. After study the paper you will be able to know that what is data breach and how it affects us and how to stop it.