Data Security
Data Security
Data Security
Before an organization can secure data, it has to know what data it has.
This is where a data inventory --a record of all the data created, used and
stored by a company -- is key. The process starts with data discovery, or
learning what and where the data is. Data classification follows, which
involves labeling data to make it easier to manage, store and secure. The
four standard data classification categories are as follows:
1. public information
2. confidential information
3. sensitive information
4. personal information
PCI data
intellectual property
In March of 2018, it became public that the personal information of more than a
billion Indian citizens stored in the world’s largest biometric database could be
bought online.
This massive data breach was the result of a data leak on a system run by a state-
owned utility company. The breach allowed access to private information
of Aadhaar holders, exposing their names, their unique 12-digit identity numbers,
and their bank details.
The type of information exposed included the photographs, thumbprints, retina scans
and other identifying details of nearly every Indian citizen.
Data associated with 700 million LinkedIn users was posted for sale in a Dark Web
forum on June 2021. This exposure impacted 92% of the total LinkedIn user base of
756 million users.
The data was dumped in two waves, initially exposing 500 million users, and then a
second dump where the hacker "God User" boasted that they were selling a
database of 700 million LinkedIn.
Email addresses
Full names
Phone numbers
Geolocation records
LinkedIn username and profile URLs
Personal and professional experience
Genders
Other social media accounts and details
LinkedIn claims that, because personal information was not compromised, this event
was not a 'data breach but, rather, just a violation of their terms of service through
prohibited data scraping.
Learn about the difference between a data breach and a data leak.
But the leaked data is sufficient to launch a deluge of cyberattacks targeting exposed
users, which makes the incident heavily weighted towards a data breach
classification.
In April 2019, the UpGuard Cyber Risk team revealed two third-party Facebook app
datasets had been exposed to the public Internet. One, originating from the Mexico-
based media company Cultura Colectiva, weighs in at 146 gigabytes and contains
over 533 million records detailing comments, likes, reactions, account names, FB
IDs and more. This same type of collection, in similarly concentrated form, has been
cause for concern in the recent past, given the potential uses of such data. Read
more about this Facebook data breach here.
This database was leaked on the dark web for free in April 2021, adding a new wave
of criminal exposure to the data originally exfiltrated in 2019. This makes Facebook
one of the recently hacked companies 2021, and therefore, one of the largest
companies to be hacked in 2021.
------------------------------------------ANJU ANILKUMAR-----------------------------------
---------------------------------------------ALWYN REJI----------------------------------------
1. Stolen Information
While you may think this sounds ridiculous, humans are very capable of
making errors and they often do. Errors that can cost their company
hundreds of thousands, if not millions, of dollars.
Even Apple has fallen prey to data breaches, including when a careless
employee left a prototype of one of their new iPhones lying around. Within
just a few hours, the specs and hardware of the yet-to-be-released phone
were all over the Internet.
2. Ransomware
In a ransomware attack, you suddenly get a message stating that all data on
your phone or computer is now encrypted, denying you access to your own
data. With ransomware, the perpetrator will tell you that they will turn the
data back over to you and not release it to the public if you pay a fee. This
can range from nominal to hundreds of thousands of dollars. The problem
here is that you’re dealing with an admitted criminal and paying the ransom
doesn’t guarantee that you’ll actually get your data back or that they won’t
release it later.
3. Password Guessing
Another really simple, but incredibly damaging issue is when passwords are
stolen. This happens more often than you would think. Some companies
leave passwords for computers on Post-It notes, allowing anyone to access
them, which could have meddling employees accessing the files somewhere
else.
Many people are hacked simply because their password was too easy or
guessable. This type of breach is called brute-force attack and is a very
common method amongst hackers. People often use passwords like the
name of their street, pet’s name, or their birthday, which can make hacking
into their accounts easy.
It goes without saying that if someone has your password, they can go into
your files and find any type of sensitive information on your company they
desire.
4. Recording Keystrokes
Cybercriminals can insert or email you malware called keyloggers that can
record what you’re typing onto your computer. The data is passed back to
the hackers and used to access sensitive data. This can happen at your place
of employment, or on your personal computer.
When this happens, they record everything you are typing – regardless of
whether or not the characters appear on screen. This makes it easy for the
perpetrator to gather passwords, credit card numbers, and sensitive
information you might enter into a database like names, health data, or
pretty much anything else.
This can be used against your company easily, as they will immediately have
your passwords as well as company credit card information. They will then
use these to find and possibly release sensitive company information.
5. Phishing
Phishing attacks come from third-party hackers who create sites that look
incredibly genuine. For example, they may make a site that mirrors PayPal,
and ask you to log into the site for a necessary change. If you log in it
without realizing that you’re not simply logging in to your account, you can
end up giving the hacker your password.
This scheme is common at universities. Students will often get emails from
a third party posing as the school asking them to confirm their login details.
Once they do, the hacker then has their login details to do anything they
please with them. We’ve also seen phishing attacks target Microsoft 365
applications, most notably Exchange Online.
6. Malware or Viruses
Malware or viruses are sent to people with the goal of wiping their
computer of all data. This can be harmful to any company, especially those
who rely on their data. For example, if a malware virus was sent to a
hospital, it could wipe the data of thousands of patients. This could result in
a very serious situation, delaying treatment or even mean the death of
some of those inside the hospital.
This attack tends to only target larger companies and is often a form of
protest. For example, if vigilante justice trolls, like Anonymous, decide that
they do not like the way a pharmaceutical company is running and feels it is
taking advantage of patients, they can launch a denial-of-service attack.
This type of attack does not often happen to individuals, as it takes a large
amount of resources and a very coordinated attack.
-------------------------ALWYN REJI---------------------
----------------------ARAVIND BABU-------------------
Data Security vs. Data Privacy
Data encryption is the use of algorithms to scramble data and hide its true
meaning. Encrypting data ensures messages can only be read by recipients with
the appropriate decryption key. This is crucial, especially in the event of a data
breach, because even if an attacker manages to gain access to the data, they
will not be able to read it without the decryption key.
Data encryption also involves the use of solutions like tokenization, which
protects data as it moves through an organization’s entire IT infrastructure.
Data Erasure
There will be occasions in which organizations no longer require data and need
it permanently removed from their systems. Data erasure is an effective data
security management technique that removes liability and the chance of a data
breach occurring.
Data Masking
What is a VPN?
A VPN (virtual private network) is a service that creates a
safe, encrypted online connection. Internet users may use a VPN to
give themselves more privacy and anonymity online or circumvent
geographic-based blocking and censorship. VPNs essentially
extend a private network across a public network, which should
allow a user to securely send and receive data across the internet.
How do VPNs work?
At its most basic level, VPN tunneling creates a point-to-point
connection that cannot be accessed by unauthorized users. To
create the tunnel, a tunneling protocol is used over existing
networks. Different VPNs will use different tunneling protocols,
such as OpenVPN or Secure Socket Tunneling Protocol (SSTP). The
tunneling protocol used may depend on the platform the VPN is
being used on, such as SSTP being used on Windows OS, and will
provide data encryption at varying strengths. The endpoint device
needs to be running a VPN client (software application) locally or in
the cloud. The client will run in the background. The VPN client is
not noticeable to the end user unless it creates performance issues.
VPN VS TOR
A VPN and the Tor network share a lot in common, but they
have different uses.
But let’s get down to brass tacks. What are Tor and VPNs best
suited for?
-------------------------------------ARAVIND BABU---------------------------------------