Data Breaches

When a system is broken into by threat agents (e.g., hackers, identity thieves etc.) how much damage have then actually caused? Maybe none, maybe they are just using the existing resources to plan the next attack. Although few of us realise the amount of damage we receive when our private and hence personal information is obtained by these mischievous people.

Let us take a close look at a few breakings that have been catalogued here (i.e., http://www.privacyrights.org/ar/ChronDataBreaches.htm) and imagine that one of those breakings involved your private details.

This is a very good example of the magnitude of information lost when a breaking occurs, it can also be classified as an administrators nightmare.

Personally I do not see these types of attacks decreasing, on the contrary I see them increasing as motives (e.g., money) and finding targets is easy in our ever connecting world.

Links:

A Chronology of Data Breaches: Reported Since the ChoicePoint Incident – http://www.privacyrights.org/ar/ChronDataBreaches.htm

This entry was posted in Uncategorized. Bookmark the permalink.

2 Responses to Data Breaches

  1. Mike Lloyd says:

    Universities have been targets because we have high-speed
    networks, very good equipment and, of necessity, an open policy of
    access.

    Access to our data has not been much of an issue in the past.
    Taking more care of our data in the future is going to pose huge
    cultural changes. Academics are going to have to ‘get real’ about
    more than just space!

  2. What Universities/large organisations do not
    realise is that simple break-ins occur through
    un-secure channels which are hard to monitor.
    Usually breaches are only picked up on after
    anything major has happened or by chance, and
    network administrators thought they are not lucky.

    Unfortunately a simple statement holds true, to
    what extent does someone care about security when
    all he/she needs to do is get work done. When does
    security obstruct normal working conditions?

    Only a truly transparent way of securing end users
    would be most effective. It will be a while till
    something like this makes an appearance and is
    effective enough.

    I do not agree on the other hand that our freedom
    to exchange knowledge and information should be
    sacrificed in the name of security.

Leave a Reply

Your email address will not be published. Required fields are marked *