Skip to main content


 What is a data breach?


First of all, I think we need to understand that a data security breach could happen to anyone person or a big company or a small company. Really a data security breach could happen to anyone.

 

A breach of security data is where critical data and sensitive information Is obtained without the knowledge and authorization off the owner’s system. Data is so valuable nowadays and if the attacker pulls off a data security breach that means the attacker could have innocent people’s private information, account details, Finances. The attacker could even modify or alter or even destroy any sensitive data once the data security breach has been successful. The attacker could also steal private information and account details for fraudulent use, make an account on the information the attacker has obtained.

 

 

Top three biggest data security breaches


  1.         The biggest data security breach was Yahoo. This involved 3 billion Yahoo users accounts were Compromise to reveal names, email addresses and telephone numbers in 2014.
  2.          Marriott international had a data security breach which involved 500 million of the Marriott international customers had their encrypted payment cards information, contact information and other details stolen in 2014.
  3.            147.9 million Equifax customers' Social Security numbers were stolen along with other personal data in 2017.

 

What can cause data security breaches?

 

Data security breaches are becoming more frequent, and it is important to know how these threats occur. There are a few things to look out for to be less exposed for data security breach :

  1.            Make sure you have a secure network; network security breaches are carried out through malware attacks.
  2.         Phishing and social engineering techniques launched through emails can make unsuspecting employees reveal sensitive information.
  3.         Data that is shared between employees can be sent by accident to another employee who opens up on unsecured network, so just be careful when you open up your files.

Comments

Popular posts from this blog

 Data security week 5 blog   Intrusion Detection Systems What is Intrusion Detection Systems? Intrusion Detection Systems or in short form IDS. Am going to refer to Intrusion Detection Systems as IDS. IDS is a network security tool that is used to for detecting vulnerability exploits against a target application or computer. Intrusion Prevention Systems (IPS) extended IDS solutions by adding the ability to block threats in addition to detecting them and has become the dominant deployment option for IDS/IPS technologies. IDS monitors network traffic for unusual or suspicious activity and sends an alert to the administrator user. Detection of anomalous activity and reporting it to the network administrator is one of the main functions however, some IDS software can take action based on rules when malicious activity is detected, like blocking certain untrustworthy incoming traffic. IDS can be host based or network-based systems.   How can IDS protect your ne...
Data security firewall  What is a firewall? A firewall is network security device or software that monitors incoming and outgoing network traffic, it permits, or blocks network traffic data packets based on a set of security rules . The purpose of the firewall is filter out any malicious traffic like viruses and hackers and tonight access to the viruses and hackers, and it will allow safe network traffic through such as the Internet. By default, a firewall blocks all network traffic coming into the network it is protecting.  For the campus firewall this means that no traffic from the Internet can get on the Missouri State campus network without explicit permission.  To permit traffic through the firewall we create exceptions or rules that allow certain traffic on the network.  The rules are defined by the IP addresses of the sender and receiver of the traffic as well as the type of traffic e.g. web or SSH.  Types of firewalls Firewalls can either be soft...

My home workout!!

I am no way a professional or a athlete but I have been keeping up with a routine that works for me. I have been into training since 2015, I have a very small home gym which contains:- A bench  Wights up to 20kg Dumbbell Dip and pull up machine  Mats   Today we are going over my Upper Body Push day :- First for a warm up 5 minute skipping. High knees skipping  Push up 5- 10 Stretch your upper body    Then right into the main workout:-  Close-Grip Bench Press - 4 sets x 10, 8,8,6 reps  with 60 seconds rest Incline Dumbbell hammer- grip press 4 x set 8 reps with 60 second rest  Dumbbell rear delt raise - 4 sets x 12 with 60 seconds rest  Skull crusher - 4 sets x 10,8,8,6 with 60 seconds rest  Decline Push up - 4 set between 10-15 with second rest Arnold Press - 4 sets 8 reps with seconds rest  Body-weight Dips - 4 sets reps Max out 60 seconds rest Cool Down :-  5 minutes walk a...