1.2.1 Types of Organizational Data
1.2.1 Types of Organizational Data
1 Types of Organizational
Data
1.2.1.1 Traditional Data
Traditional data is typically generated and maintained by all
organizations, big and small. It includes the following:
Scroll down to find out more about the different elements of each
dimension.
It took Razer more than three weeks to secure the cloud instance from
public access, during which time cybercriminals had access to
customer information that could have been used in social engineering
and fraud attacks, like the one you uncovered just now.
Equifax Inc.
If you are ever faced with a similar situation, quickly verify if your
information was compromised, so that you can minimize the impact.
Keep in mind that, in a time of crisis, you may be tricked into using
unauthorized websites.
Reputational damage
Vandalism
theft
Loss of revenue
Despite the best of intentions and all the safeguards you can put in
place, protecting organizations from every cyberattack is not feasible.
Cybercriminals are constantly finding new ways to attack and,
eventually, they will succeed.
CYBER ATTACKERS
Attackers are individuals or groups who attempt to exploit vulnerability
for personal or financial gain. As we’ve already seen, they are
interested in everything, from credit cards to product designs!
Amateurs
Hackers
External
And you’ve almost completed this first module. But before you move
on, let’s check your understanding of everything we’ve covered so far
with a short quiz.