Actions

Difference between revisions of "Data Breach"

m
m
Line 1: Line 1:
A '''Data Breach''' is an incident where information is stolen or taken from a [[system]] without the knowledge or authorization of the system’s owner. A small company or large [[organization]] may suffer a data breach. Stolen data may involve sensitive, proprietary, or confidential information such as credit card numbers, [[customer]] data, trade secrets, or matters of national security.<ref>Definition - What is Data Breach [https://www.trendmicro.com/vinfo/us/security/definition/data-breach Trend Micro]</ref>
+
A '''Data Breach''' is an incident where information is stolen or taken from a system without the knowledge or authorization of the system’s owner. A small company or large organization may suffer a data breach. Stolen data may involve sensitive, proprietary, or confidential information such as credit card numbers, customer data, trade secrets, or matters of national security.<ref>Definition - What is Data Breach [https://www.trendmicro.com/vinfo/us/security/definition/data-breach Trend Micro]</ref>
  
A data breach may include incidents such as theft or loss of digital media such as [[computer]] tapes, hard drives, or laptop computers containing such media upon which such information is stored unencrypted, posting such information on the world wide web or on a computer otherwise accessible from the [[Internet]] without proper information security precautions, transfer of such information to a system which is not completely open but is not appropriately or formally accredited for security at the approved level, such as unencrypted e-mail, or transfer of such information to the information systems of a possibly hostile agency, such as a competing corporation or a foreign nation, where it may be exposed to more intensive decryption techniques.
+
A data breach may include incidents such as theft or loss of digital media such as computer tapes, hard drives, or laptop computers containing such media upon which such information is stored unencrypted, posting such information on the world wide web or on a computer otherwise accessible from the Internet without proper information security precautions, transfer of such information to a system which is not completely open but is not appropriately or formally accredited for security at the approved level, such as unencrypted e-mail, or transfer of such information to the information systems of a possibly hostile agency, such as a competing corporation or a foreign nation, where it may be exposed to more intensive decryption techniques.
  
 
ISO/IEC 27040 defines a data breach as: compromise of security that leads to the accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to protected data transmitted, stored or otherwise processed.
 
ISO/IEC 27040 defines a data breach as: compromise of security that leads to the accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to protected data transmitted, stored or otherwise processed.
Line 9: Line 9:
 
<div style="column-count:2;-moz-column-count:4;-webkit-column-count:4">
 
<div style="column-count:2;-moz-column-count:4;-webkit-column-count:4">
 
*[[Cyber Security]]
 
*[[Cyber Security]]
*[[Data]]
 
*[[Data Access]]
 
*[[Data Analysis]]
 
*[[Data Analytics]]
 
*[[Data Architecture]]
 
*[[Data Asset Framework (DAF)]]
 
*[[Data Buffer]]
 
*[[Data Center]]
 
*[[Data Center Infrastructure]]
 
*[[Data Center Infrastructure Management (DCIM)]]
 
*[[Data Cleansing]]
 
*[[Data Compatibility]]
 
*[[Data Governance]]
 
*[[Data Integration]]
 
*[[Data Management]]
 
*[[Data Mining]]
 
*[[Data Monitoring]]
 
*[[Data Munging]]
 
*[[Data Portability]]
 
*[[Data Quality]]
 
*[[Data Reference Model (DRM)]]
 
*[[Data Security]]
 
*[[Data Transformation]]
 
*[[Data Visualization]]
 
*[[Data Warehouse]]
 
 
</div>
 
</div>
  

Revision as of 00:19, 3 January 2023

A Data Breach is an incident where information is stolen or taken from a system without the knowledge or authorization of the system’s owner. A small company or large organization may suffer a data breach. Stolen data may involve sensitive, proprietary, or confidential information such as credit card numbers, customer data, trade secrets, or matters of national security.[1]

A data breach may include incidents such as theft or loss of digital media such as computer tapes, hard drives, or laptop computers containing such media upon which such information is stored unencrypted, posting such information on the world wide web or on a computer otherwise accessible from the Internet without proper information security precautions, transfer of such information to a system which is not completely open but is not appropriately or formally accredited for security at the approved level, such as unencrypted e-mail, or transfer of such information to the information systems of a possibly hostile agency, such as a competing corporation or a foreign nation, where it may be exposed to more intensive decryption techniques.

ISO/IEC 27040 defines a data breach as: compromise of security that leads to the accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to protected data transmitted, stored or otherwise processed.


See Also


References

  1. Definition - What is Data Breach Trend Micro