Data Breaches

A data breach is a security incident within the field of cybersecurity where sensitive, protected, or confidential information is accessed, copied, transmitted, or stolen by an individual unauthorized to do so. As a fundamental concept in computer science, breaches occur when malicious actors exploit vulnerabilities in software, networks, or human behavior, often through methods like phishing, malware, or direct attacks on servers. The consequences of a successful breach can be severe, leading to identity theft for individuals, significant financial loss and reputational damage for organizations, and regulatory penalties for non-compliance with data protection laws.

  1. Fundamentals of Data Breaches
    1. Defining a Data Breach
      1. Technical Definitions
        1. Industry-Specific Definitions
          1. Distinction from Security Incident
            1. Characteristics of Data Breaches
              1. Characteristics of Security Incidents
                1. Overlap and Differences
                2. Core Components
                  1. Unauthorized Access
                    1. Methods of Gaining Unauthorized Access
                      1. Indicators of Unauthorized Access
                      2. Data Exfiltration
                        1. Techniques for Data Extraction
                          1. Detection of Data Exfiltration
                          2. Data Disclosure
                            1. Accidental Disclosure
                              1. Intentional Disclosure
                          3. Key Terminology
                            1. Personally Identifiable Information (PII)
                              1. Direct Identifiers
                                1. Indirect Identifiers
                                  1. Sensitive PII
                                    1. Non-Sensitive PII
                                      1. Risks Associated with PII Exposure
                                      2. Protected Health Information (PHI)
                                        1. Definition and Examples
                                          1. Electronic PHI (ePHI)
                                            1. Regulatory Protections
                                            2. Confidential Information
                                              1. Business Confidential Data
                                                1. Trade Secrets
                                                  1. Attorney-Client Privileged Information
                                                  2. Threat Actor
                                                    1. Internal Threat Actors
                                                      1. External Threat Actors
                                                        1. Threat Actor Capabilities
                                                        2. Vulnerability
                                                          1. Technical Vulnerabilities
                                                            1. Process Vulnerabilities
                                                              1. Human Vulnerabilities
                                                                1. Vulnerability Lifecycle
                                                                2. Exploit
                                                                  1. Zero-Day Exploits
                                                                    1. Known Exploits
                                                                      1. Exploit Development
                                                                        1. Exploit Kits
                                                                        2. Attack Vector
                                                                          1. Network-Based Vectors
                                                                            1. Physical Vectors
                                                                              1. Social Engineering Vectors
                                                                                1. Supply Chain Vectors
                                                                              2. Types of Data Targeted
                                                                                1. Financial Data
                                                                                  1. Credit Card Information
                                                                                    1. Bank Account Details
                                                                                      1. Investment Records
                                                                                        1. Tax Information
                                                                                        2. Personal Identity Data
                                                                                          1. Social Security Numbers
                                                                                            1. Driver's License Information
                                                                                              1. Passport Information
                                                                                                1. Birth Certificates
                                                                                                2. Health Records
                                                                                                  1. Medical Histories
                                                                                                    1. Prescription Information
                                                                                                      1. Insurance Information
                                                                                                        1. Mental Health Records
                                                                                                        2. Intellectual Property
                                                                                                          1. Patents and Designs
                                                                                                            1. Proprietary Algorithms
                                                                                                              1. Research and Development Data
                                                                                                                1. Source Code
                                                                                                                2. Government and State Secrets
                                                                                                                  1. Classified Documents
                                                                                                                    1. Diplomatic Communications
                                                                                                                      1. Military Intelligence
                                                                                                                        1. Law Enforcement Records
                                                                                                                        2. Corporate Data
                                                                                                                          1. Customer Lists
                                                                                                                            1. Financial Reports
                                                                                                                              1. Strategic Plans
                                                                                                                                1. Employee Records