Actions

Difference between revisions of "Data Breach"

m (The LinkTitles extension automatically added links to existing pages (https://github.com/bovender/LinkTitles).)
m
Line 8: Line 8:
 
===See Also===
 
===See Also===
 
<div style="column-count:2;-moz-column-count:4;-webkit-column-count:4">
 
<div style="column-count:2;-moz-column-count:4;-webkit-column-count:4">
[[Data]]<br />
+
*[[Information Security]]
[[Data Access]]<br />
+
*[[Cyber Crime]]
[[Data Analysis]]<br />
+
*[[Cyber Security]]
[[Data Analytics]]<br />
+
*[[Data]]
[[Data Architecture]]<br />
+
*[[Data Access]]
[[Data Asset Framework (DAF)]]<br />
+
*[[Data Analysis]]
[[Data Buffer]]<br />
+
*[[Data Analytics]]
[[Data Center]]<br />
+
*[[Data Architecture]]
[[Data Center Infrastructure]]<br />
+
*[[Data Asset Framework (DAF)]]
[[Data Center Infrastructure Management (DCIM)]]<br />
+
*[[Data Buffer]]
[[Data Cleansing]]<br />
+
*[[Data Center]]
[[Data Collection]]<br />
+
*[[Data Center Infrastructure]]
[[Data Compatibility]]<br />
+
*[[Data Center Infrastructure Management (DCIM)]]
[[Data Consolidation]]<br />
+
*[[Data Cleansing]]
[[Data Deduplication]]<br />
+
*[[Data Compatibility]]
[[Data Delivery Platform (DDP)]]<br />
+
*[[Data Governance]]
[[Data Description (Definition) Language (DDL)]]<br />
+
*[[Data Integration]]
[[Data Dictionary]]<br />
+
*[[Data Management]]
[[Data Discovery]]<br />
+
*[[Data Mining]]
[[Data Driven Organization]]<br />
+
*[[Data Monitoring]]
[[Data Element]]<br />
+
*[[Data Munging]]
[[Data Enrichment]]<br />
+
*[[Data Portability]]
[[Data Entry]]<br />
+
*[[Data Quality]]
[[Data Federation]]<br />
+
*[[Data Reference Model (DRM)]]
[[Data Flow Diagram]]<br />
+
*[[Data Security]]
[[Data Governance]]<br />
+
*[[Data Transformation]]
[[Data Health Check]]<br />
+
*[[Data Visualization]]
[[Data Hierarchy]]<br />
+
*[[Data Warehouse]]
[[Data Independence]]<br />
 
[[Data Integration]]<br />
 
[[Data Integration Framework (DIF)]]<br />
 
[[Data Integrity]]<br />
 
[[Data Island]]<br />
 
[[Data Item]]<br />
 
[[Data Lake]]<br />
 
[[Data Life Cycle]]<br />
 
[[Data Lineage]]<br />
 
[[Data Loss Prevention (DLP)]]<br />
 
[[Data Management]]<br />
 
[[Data Migration]]<br />
 
[[Data Minimization]]<br />
 
[[Data Mining]]<br />
 
[[Data Model]]<br />
 
[[Data Modeling]]<br />
 
[[Data Monitoring]]<br />
 
[[Data Munging]]<br />
 
[[Data Portability]]<br />
 
[[Data Preparation]]<br />
 
[[Data Presentation Architecture]]<br />
 
[[Data Processing]]<br />
 
[[Data Profiling]]<br />
 
[[Data Proliferation]]<br />
 
[[Data Propagation]]<br />
 
[[Data Protection Act]]<br />
 
[[Data Prototyping]]<br />
 
[[Data Quality]]<br />
 
[[Data Quality Assessment (DQA)]]<br />
 
[[Data Quality Dimension]]<br />
 
[[Data Quality Standard]]<br />
 
[[Data Reconciliation]]<br />
 
[[Data Reference Model (DRM)]]<br />
 
[[Data Science]]<br />
 
[[Data Security]]<br />
 
[[Data Stewardship]]<br />
 
[[Data Structure]]<br />
 
[[Data Structure Diagram]]<br />
 
[[Data Suppression]]<br />
 
[[Data Transformation]]<br />
 
[[Data Validation]]<br />
 
[[Data Value Chain]]<br />
 
[[Data Vault Modeling]]<br />
 
[[Data Virtualization]]<br />
 
[[Data Visualization]]<br />
 
[[Data Warehouse]]<br />
 
[[Data Wrangling]]<br />
 
[[Data and Information Reference Model (DRM)]]<br />
 
[[Data as a Service (DaaS)]]<br />
 
[[Database (DB)]]<br />
 
[[Database Design]]<br />
 
[[Database Design Methodology]]<br />
 
[[Database Management System (DBMS)]]<br />
 
[[Database Marketing]]<br />
 
[[Database Schema]]<br />
 
[[Database System]]<br />
 
 
</div>
 
</div>
  

Revision as of 19:52, 26 October 2022

A Data Breach is an incident where information is stolen or taken from a system without the knowledge or authorization of the system’s owner. A small company or large organization may suffer a data breach. Stolen data may involve sensitive, proprietary, or confidential information such as credit card numbers, customer data, trade secrets, or matters of national security.[1]

A data breach may include incidents such as theft or loss of digital media such as computer tapes, hard drives, or laptop computers containing such media upon which such information is stored unencrypted, posting such information on the world wide web or on a computer otherwise accessible from the Internet without proper information security precautions, transfer of such information to a system which is not completely open but is not appropriately or formally accredited for security at the approved level, such as unencrypted e-mail, or transfer of such information to the information systems of a possibly hostile agency, such as a competing corporation or a foreign nation, where it may be exposed to more intensive decryption techniques.

ISO/IEC 27040 defines a data breach as: compromise of security that leads to the accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to protected data transmitted, stored or otherwise processed.


See Also


References

  1. Definition - What is Data Breach Trend Micro