Professional Documents
Culture Documents
Exposure
AGENDA
•Intrusion
Attackers may snip or adapt such
inadequately secured data to demeanor
fraud of credit card, identity burglary, or
other corruptions.
How the Data is Exposed Online
Example
How the Data is Exposed Online
• Phishing
This is basically direct attack on clients
rather than on companies.
Statistical Data
Internal and External Attacks
• Conduction of regular
assessment of risk, checking
security time to time.
HOW TO PREVENT SENSITIVE DATA EXPOSURE