Data Security

7. Famous Security Breaches

We've got your number!

We've been building up a series of case histories on some of the famous hacks, including Sony, Stuxnet and others. But these are just the tip of the iceberg when it comes to security breaches.

Take a look at Breach Level Index which shows the number data records lost or stolen since 2013. That number at the far left is counting billions. That's more people than are alive in the world.

The site breaks the number of breaches down into different type, industry and regions. Yearly summaries are also available, so take a look at a recent year Records compromised in 2016

World's Biggest Breaches

While the Breach Level Index gives useful information on the number of breaches that have taken place, it doesn't provide much detail on who has suffered a security breach, nor much information on the size of each breach.

For that we have to go to look at World's Biggest Data Breaches.

Only breaches greater than 30,000 records are shown. The size of the circle is proportional to the size of the loss, so greater the loss, the bigger the circle. Clicking in each circle allows you to access additional information.

From 2004 onwards, a general trend emerges. The number of breaches increase and they tend to be larger. The 92 million records stolen in 2004 seems large, but pales when compared Yahoo and River City Media.

Biggest Data Breaches
Create a new page in your Notebook; title it Security Breaches and answer the following questions
  1. Which company has suffered the biggest data breach?
  2. Research the biggest data breach and explain what happened.
  3. List the 5 biggest breaches?
  4. What is the main cause of security breaches?
  5. Which sector of activity has suffered the most breaches of security?
  6. The size of security breaches are generally getting bigger. Why is this?
Remember, the number of reported breaches are really only the tip of the iceberg.

Can you now do?

  • Provide an idea of the size of security breaches
  • Identify the biggest cause of most security breaches.
  • Explain the principal area that is the main target of hackers.

If you don't feel confident in meeting any of these performance criteria, ask your teacher or re-read the information again.

Cyber Security

  • Security Fundamentals
  • Data Security
  • Digital Forensics
  • Ethical Hacking
Supporting courses by the SQA Logo
css badge
html badgee