You are on page 1of 3

SECURITY BREACHES

MIS 605
Introduction

Any method or occurrence that leads in unauthorised access to data, applications, networks

services or devices by circumventing their security protection is referred to as a "security

breach." When an unknown application gains access to a private, confidential, or

unapproved logical boundary, this is referred to as a security breach. Security breach is also

referred to as security infringement in some cases. A security breach is one of the early

phases of a hacker's security attack, and it is one of the most dangerous stages of the attack.

The detection of security breaches in a corporation or organization is accomplished by

software or hardware. When any form of intrusion, abnormality, or violation happens, the

firewall sends a notification to the network administrator to investigate.

Example of security breach

LinkedIn

Date: June 2021

Impact: 700 million users

On June 20, 2021, a Dark Web site placed a listing for data related with 700 million LinkedIn

members, which was purchased. This exposure had an influence on 92 percent of the

overall LinkedIn user base, which consisted of 756 million people.

In two waves, the data was leaked, with the first exposing 500 million users and the second

exposing 700 million people, according to the hacker "God User," who bragged that they

were selling a database of 700 million LinkedIn members.


When the hackers provided a sample of one million data, it was to demonstrate the

credibility of the intrusion. The following information was included in the data:

 Email addresses

 Full names

 Phone numbers

 Geolocation records

 LinkedIn username and profile URLs

 Personal and professional experience

 Genders

 Other social media accounts and details

The data was scraped by a hacker who took use of LinkedIn's API.

LinkedIn asserts that, because no personal information was exposed, this was not a

"security breach," but rather a violation of their terms of service due to banned data

scraping, and that they are investigating the matter.

Reference
The 63 Biggest Data Breaches (Updated for February 2022) | UpGuard. Upguard.com. (2022).
Retrieved 1 April 2022, from https://www.upguard.com/blog/biggest-data-breaches.

You might also like