Presentation (4) Cyber
Presentation (4) Cyber
Soumyadip
Auric Dutt Trinankur Guha Reya Datta Ankur Haldar Mriganka Ghosh
Karan
F3 F6 F5 F8 F9
B.TECH CSE B.TECH CSBS B.TECH ECE I1
B.TECH CSE B.TECH CSE_AI 231001020004 DIPLOMA
231001001005 231003003152 231001001450 231001002010
231001201033
TEAM MEMBER’S
PROFILES
TEAM MEMBER’S NAME STRENGTH WEAKNESS JOB ROLE
SEMESTER 1 :
We made our new group and select SEMESTER 2 : SEMESTER 3
a topic .Then we research our topic No achievement No achievement
and ready our presentation .
MONTH 2 : No achievement
MONTH 3 : No achievement
MONTH 4 : No achievement
MONTH 5 : We made our new group and select a topic .Then we research our topic
DATA BREACH
A data breach is a security violation that
occurs when sensitive, protected, or
confidential data is accessed or disclosed by
an unauthorized individual.
Our goal
• Data privacy practices also protect against data breaches that can devastate a business. Strong
data privacy practices help businesses protect their customers' personal information from being
compromised.
• Encryption is a crucial component of data security that involves the use of algorithms to
transform readable information into an unreadable and unintelligible format.
4 COMMON TYPES OF DATA BREACHES
Anonymization, encryption,
Technological Focus Cybersecurity measures
consent management
Microsoft
Date: January 2021
Impact: 30,000 US companies (60,000 companies worldwide).
In one of the largest cyberattacks in US history, over 30,000 US businesses were affected by a sweeping attack on
the Microsoft Exchange email servers, one of the largest email servers in the world.
The hackers were able to exploit four different zero-day vulnerabilities that allowed
them to gain unauthorized access to emails from small businesses to local governments.
TOOLS FOR INCREASING DATA
SAFETY
BaseCrack [Cryptography]
BaseCrack is a Python tool that can decode all alphanumeric base encoding schemes. It can be
used for cryptography, CTFs, and bug bounty hunting.
Enforced Encryption
Enforced Encryption is a feature that allows IT administrators to automatically encrypt confidential data that is
transferred to USB storage devices. It can be used on both Windows and macOS computers
• eDiscovery
Electronic discovery (eDiscovery) is the process of finding and collecting electronically
stored information (ESI). It's typically used for lawsuits, investigations, or legal
purposes.
ANNEXUR
E
• https://securdi.com/cyber-security/an-introduction-to-data-privacy-a
nd-data-security/
• https://www.cloudflare.com/en-gb/learning/privacy/what-is-data-priv
acy/
• https://www.upguard.com/blog/biggest-data-breaches-us
• https://www.digitalguardian.com/blog/history-data-breaches
• https://www.enzuzo.com/blog/data-privacy-benefits#:~:text=Individu
al%20data%20privacy%20helps%20both,%2C%20fraud%2C%20and%
20financial%20loss
.
• https://www.integrate.io/blog/what-is-data-privacy-why-is-it-importa
nt/
Thank you