User:EnairGnorom/sandbox

= Data Breaches = Data Breaches, or in more simple terms, 'Stolen' or 'Leaked' data usually consists of confidential information or texts occur often. For the past years, data breaches are getting more common (as of 2021 there had been more than a thousand cases for data breaches/leaked data ). There are three types of data breaches; (1) Physical, (2) [https://www.shrednations.com/2015/08/different-types-of-data-breaches/#:~:text=An%20electronic%20breach%20is%20an,vulnerabilities%20through%20application%2Dlevel%20attacks. Electronic], (3) [https://www.shrednations.com/2015/08/different-types-of-data-breaches/#:~:text=An%20electronic%20breach%20is%20an,vulnerabilities%20through%20application%2Dlevel%20attacks. Skimming].

Physical Data Breaches
A physical data breach involves physical theft of information such containing personal or confidential information (E.G cardholder accounts ) Physical Data Breaches are sometimes referred to as corporate espionage and items at risk including; desktop and laptop computers. These attacks are simply done if a device containing important information is left unattended especially outdoors in a public area. How to avoid physical data breach? One must never leave their devices alone at all times and should have a separate device containing personal, and public information (if necessary) or encrypt the confidential information instead.

Electronic Data Breaches
An electronic data breach involves an unauthorized or a forbidden individual accessing a network environment where (in most cases) where cardholder data is processed, stored or transmitted. This results to an acquiring access via web servers to a system's weakness through application-level attacks. (E.G data breaches often occurring the healthcare industry because getting a hands on these data exposes a wealth of a private patient's billing information). How to avoid electronic data breach? Information must stay encrypted well, making it difficult for attackers to crack or get the information. Think of encryption as a special password covering these confidential data.



Skimming Data Breaches
A skimming data breach involves the seizing of magnetic stripe data found on the back of the credit cards. This process is done by using an external device that is sometimes installed on the merchant's POS without them knowing. In some cases this type of data breach involves a dishonest employee utilizing device to collect the card's magnetic stripe data. These thieves then collect data and use it to counterfeit credit and debit cards. '''How to avoid skimming data breach? Monitor the handling of cards''' when employees frequently have the physical possession of credit cards out of the cardholder's view.

SOURCES AND NOTES
This wiki page is for educational purposes only, I've compiled what I already know and a bunch of resources that I'll be linking below. If you choose to edit this page, please refrain from adding unnecessary notes and points, you may correct this page if you think there is a part in this text that holds wrong information. Therefore I conclude the ending of this page, thank you!


 * Citations count as sources so I exclude those in the sources part :)
 * Credits to Shred Nation for the detailed information on the 3 types of Data Breaches, I've added some minor-major changes in the definitions to provide easy understanding. Please head to the original source here.
 * Credits to Technology.Pitt.Edu for the handful information in the 'Physical Data Breach' part, I've compiled some of Shred Nation's definitions and information in there too. View the full source here.
 * And I'd like to give advance credits to the photographers of the pictures presented in this page. I do not claim any of the three images to be mine and all rights will be reserved to its original owners.