You are on page 1of 12

AADHAR

DATA
BREACH
GROUP 5
About AADHAR & UIDAI

1.
Key Decisions

2.
MIS Interventions

3.
MIS Infrastructure

4.
Artificial Intelligence

5.
Security
HOW TO PREVENT BREACHES?

• LOOK FOR VULNERABILITIES

• TRAIN YOUR EMPLOYEES

• D ATA B A C K U P

• FIREWALLS
Security issues faced by aadhar issuing authority UIDAI

Application Related Flaws

•  Flaws in the mAadhaar app that is available on the Google Play Store.

• An IIT graduate was arrested for illegally accessing the Aadhaar database back in August 2017 .He created an app called ‘Aadhaar eKYC’ by
hacking into the servers related to an ‘e-Hospital system’ that was created under the Digital India initiative. The eKYC app would then route
all the requests through those servers

Government Websites

RTI query pushed UIDAI to reveal that about 210 government websites made the Aadhaar details of people with Aadhaar, public on the
internet, through Phishing.

Centre for Internet and Society (CIS) also pointed out that about 130 million Aadhar numbers along with other sensitive data were
available on the internet

Third Party Leaks

There have been a number of leaks when it comes to demographic data.


Prevention of Security Breaches

• Look for Vulnerabilities

• Train Your Employees

• Data Backups

• Firewalls

• Encrypt Sensitive Data

• Virtualization
Summary

7.

You might also like