Protecting sensitive data
Because of the expanding networks, additional devices, and the Internet of Things (IoT), data is in many places. Data lives within an organization, on storage devices, or even in our cars and homes, and is growing at an exponential rate. Along with this growth comes the real concern of the threat of unauthorized access to data.
Many individuals feel that data is the new gold. Cybercriminals are constantly seeking ways to gain access to our data, for a variety of reasons. Reasons include data theft, along with a newer threat, data modification. Unlike theft, data modification seeks to alter the integrity of data, for example, changing the details of blueprints or intellectual property.
In this section, we'll take a look at the many attack vectors that provide a way for data to be compromised in some way. Then we'll take a look at a few key methods to defend against data loss or modification.
Let's start with a discussion of the ways...