Save
DATA SECURITY
Data Security Breaches
Save
Share
Learn
Content
Leaderboard
Learn
Created by
Lucia Rufo
Visit profile
Cards (20)
Data breach
Where attackers gain
unauthorised
access to
personal
and
sensitive
data
The
least
common cause of data security breaches is through
software updates
on systems
Phishing attack
Sending
deceptive emails
to others to gain
information
Implications of data security breaches for individuals
Financial loss
Identity theft
Weak
passwords
on systems or accounts
Can lead to
unauthorised access
which can lead to further
complications
Businesses affected by data security breaches
Suffering from major
financial loss
and damage to
reputation
Data encryption
The practice of
securing
data in a way that makes it
unreadable
without the proper
decryption
key
The one method to prevent data security breaches is regularly
updating security software
The action which could help be
reducing
the impact of a data security breaches for individuals is regularly
monitoring financial statements
Purpose of data backup in relation to security breaches
Recovering lost
or
compromised
data
Social engineering
attack
Manipulating
individuals to
divulge sensitive
information
Spyware
Type of
malware
that remains
hidden
on a
system
and can collect
keystrokes
or
capture
screen images without the user's
knowledge
Physical security breach
Unauthorised access
to a
server room
GDPR
Regulation
that focuses on the
protection
of
personal
data for individuals within the
EU
and the
European Economic Area
A potential consequence for businesses failing to comply with data protection regulations is
legal penalties
and
fines
A step that is essential in responding to a data security breach is
notifying affected individuals promptly
Risk mitigation
The process of evaluating and addressing potential
risks
that may compromise the
security
of the data
The action that can prevent data breaches when disposing of old hardware is
erasing
data
before disposal
Increased
interconnectedness
of devices
Factor that
contributes
to the
complexity
of
securing
data in
modern
networks
Human error leading to a data security breach
Falling
for a
phishing scam