Ways That Attackers Use Your Data
The constant data breaches reported around the globe have become common news in today’s world. Many hackers and hacker communities keep on compromising systems to steal data. These data breaches range from personal-level data breaches to enterprise-level, damaging companies’ economies and reputations. Often, attackers use stolen data to commit more crimes or as entry points to attack other companies.
When it comes to concentrating on data privacy in cyberspace, it is important to understand the ways that attackers use stolen data after data breaches.
In this chapter, we will be focusing on the following:
- Impersonation and identity theft
- Technical, procedural, and physical access
- Technical controls
- Procedural controls
- Physical controls
- Creating vulnerabilities to compromise systems
- Increasing the attack surface using sensitive data
Once privacy is compromised, attackers will have your data and...