You are on page 1of 20

Sensitive Data

Exposure
AGENDA

• What is Sensitive Data Exposure

• Why data needs to be protected

• How the Data is Exposed


AGENDA

• Internal and External Attacks

• MITM (Man in the Middle)

• HOW TO PREVENT SENSITIVE DATA EXPOSURE


What is Sensitive Data Exposure

• When a user enters in any


website, they do have trust on
that website that they will not
harm their information and
sensitive. But the breaches of
data occur time to time and
results in data breaches
What is Sensitive Data Exposure
What is Sensitive Data Exposure

• With the excess applications


of web existing today, the
susceptibility and exposure of
the sensitive data of user is
increased. Hackers and
attackers do have the
advantage of insufficient
security, processed,
transmitted and the data
stored.
Why data needs to be protected

• On one ever wants to share their


data, and data are always kept to
secure in order to protect them
from hackers.
• Hackers do attack for
blackmailing in order to get
money and made the company
financial 0 for either personal
grudge.
How the Data is Exposed Online

•Intrusion
Attackers may snip or adapt such
inadequately secured data to demeanor
fraud of credit card, identity burglary, or
other corruptions.
How the Data is Exposed Online
Example
How the Data is Exposed Online
• Phishing
This is basically direct attack on clients
rather than on companies.
Statistical Data
Internal and External Attacks

• A dissatisfied employee has


more access to threat the
company’s personal
information than any stranger
as the employee already have
entree to the information of
company’s personal and
sensitive data and have the
control to destroy or blackmail
the company.
MITM (Man in the Middle)

A man in the middle (MITM)


attack is an over-all tenure used
for when a criminal place
himself in a chat between a user
and an application The main aim
of an attack is to snip personal
and sensitive information, such
as credentials of login, details of
account and credit card
numbers.
HOW TO PREVENT SENSITIVE DATA EXPOSURE

• Define approachability and encode


the data.
HOW TO PREVENT SENSITIVE DATA EXPOSURE

• Authenticating and Securing


gateways.
HOW TO PREVENT SENSITIVE DATA EXPOSURE

• Prevention from the attacks on


password.
HOW TO PREVENT SENSITIVE DATA EXPOSURE

• Conduction of regular
assessment of risk, checking
security time to time.
HOW TO PREVENT SENSITIVE DATA EXPOSURE

• Always have a backup plan


References
• IEEE Xplore. (n.d.). Retrieved from Interactive sensitive data exposure
detection through static analysis:
https://ieeexplore.ieee.org/document/8053368
• Sensitive Data Exposure. (n.d.). Retrieved from
https://www.rapid7.com/db/vulnerabilities/appspider-sensitive-data-exposure
• Sharma, A. (2019). All About OWASP #3 - Sensitive Data Exposure. Retrieved
from https://www.c-sharpcorner.com/article/all-about-owasp-3-sensitive-data-
exposure/
• Shetti, P. (2015). Importance Of Secure Coding In Operating Systems. Cyber
Security Community.
• TATA. (2015). Importance Of Secure Coding In Operating Systems. Cyber
Security Community.
• Venky. (2019). Indusface. Retrieved from Sensitive Data Exposure - A
nightmare to all business enterprises:
https://www.indusface.com/blog/sensitive-data-exposure-nightmare-
business-enterprises/
• WHAT IS SENSITIVE DATA EXPOSURE? (2019). Retrieved from Hdiv:
https://hdivsecurity.com/owasp-sensitive-data-exposure
Thank You

You might also like