2

Ways That Attackers Use Your Data

The constant data breaches reported around the globe have become common news in today’s world. Many hackers and hacker communities keep on compromising systems to steal data. These data breaches range from personal-level data breaches to enterprise-level, damaging companies’ economies and reputations. Often, attackers use stolen data to commit more crimes or as entry points to attack other companies.

When it comes to concentrating on data privacy in cyberspace, it is important to understand the ways that attackers use stolen data after data breaches.

In this chapter, we will be focusing on the following:

  • Impersonation and identity theft
  • Technical, procedural, and physical access
  • Technical controls
  • Procedural ...

Get An Ethical Guide to Cyber Anonymity now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.