Data Security Breaches

Cards (20)

  • Data breach
    Where attackers gain unauthorised access to personal and sensitive data
  • The least common cause of data security breaches is through software updates on systems
  • Phishing attack
    Sending deceptive emails to others to gain information
  • Implications of data security breaches for individuals
    • Financial loss
    • Identity theft
  • Weak passwords on systems or accounts

    Can lead to unauthorised access which can lead to further complications
  • Businesses affected by data security breaches
    Suffering from major financial loss and damage to reputation
  • Data encryption
    The practice of securing data in a way that makes it unreadable without the proper decryption key
  • The one method to prevent data security breaches is regularly updating security software
  • The action which could help be reducing the impact of a data security breaches for individuals is regularly monitoring financial statements
  • Purpose of data backup in relation to security breaches
    Recovering lost or compromised data
  • Social engineering attack

    Manipulating individuals to divulge sensitive information
  • Spyware
    Type of malware that remains hidden on a system and can collect keystrokes or capture screen images without the user's knowledge
  • Physical security breach
    • Unauthorised access to a server room
  • GDPR
    Regulation that focuses on the protection of personal data for individuals within the EU and the European Economic Area
  • A potential consequence for businesses failing to comply with data protection regulations is legal penalties and fines
  • A step that is essential in responding to a data security breach is notifying affected individuals promptly
  • Risk mitigation
    The process of evaluating and addressing potential risks that may compromise the security of the data
  • The action that can prevent data breaches when disposing of old hardware is erasing data before disposal
  • Increased interconnectedness of devices

    Factor that contributes to the complexity of securing data in modern networks
  • Human error leading to a data security breach
    • Falling for a phishing scam