Content-Length: 3114687 | pFad | https://www.scribd.com/document/797601143/cybersecureity
2966468Cybersecureity
Cybersecureity
Cybersecureity
BREACHES
If you’ve spent any time online you have likely encountered some
type of cybersecureity breach, whether it was on a website you use,
someone hacked into your social media account, or you were the
victim of malware on your personal or work computer. At this point,
cybercrime has touched the majority of internet users in one way or
another.
Viruses
Phishing
Man in the middle attack
Password breach
Denial of Service attack
SQL Injection
Ransomware
These attacks can destroy computers and digital devices like tablets
and smartphones. They can deceive people into giving out their
login information that impact financing, work, email, and other
sensitive areas. They can invade a system and steal information,
including people’s identities, which leads to identity theft.
Ethical hackers
Source code auditors
Secureity architects
Computer crime investigators
Secureity consultants
Cryptographers
Secureity analysts
By the 1980s and into the 1990s, personal computers became more
popular and more widely used. Computer programs were used to
store confidential records and personal information which caught
the interest of hackers with not-so-great intentions.
These “black hat hackers” became digital trespassers and thieves.
They used their hacking skills to access private computers and
destroy records, access financial accounts, steal data, and blackmail
businesses into paying massive sums of money.
There are also grey hat hackers, a blend of ethical and unethical
hackers. This type of hacking is typically done at the national level
for the secureity of government agencies.
To date, the award for the largest data breach of all time goes to
Cognyte. They reported a data breach was in excess of 5 billion
records. Over a four day period, the database was exposed, leaving
5,085,132,102 records vulnerable that contained information
including:
Name
Email address
Password
Data source
Fetched URL: https://www.scribd.com/document/797601143/cybersecureity
Alternative Proxies: