-
Module 1 3
Introduction
-
Lecture1.130 min
-
Lecture1.205 min
-
Lecture1.305 min
-
-
Module 2 18
Fundamental Elements of Cybersecurity
-
Lecture2.105 min
-
Lecture2.205 min
-
Lecture2.305 min
-
Lecture2.405 min
-
Lecture2.505 min
-
Lecture2.605 min
-
Lecture2.705 min
-
Lecture2.805 min
-
Lecture2.905 min
-
Lecture2.1005 min
-
Lecture2.1105 min
-
Lecture2.1205 min
-
Lecture2.1305 min
-
Lecture2.1405 min
-
Lecture2.1505 min
-
Lecture2.1605 min
-
Lecture2.1705 min
-
Lecture2.1805 min
-
-
Module 3 13
Introduction to Cyber Threats
-
Lecture3.105 min
-
Lecture3.205 min
-
Lecture3.305 min
-
Lecture3.405 min
-
Lecture3.505 min
-
Lecture3.605 min
-
Lecture3.705 min
-
Lecture3.805 min
-
Lecture3.905 min
-
Lecture3.1005 min
-
Lecture3.1105 min
-
Lecture3.1205 min
-
Lecture3.1305 min
-
-
Module 4 12
Security Risk Analysis and Management
-
Lecture4.105 min
-
Lecture4.205 min
-
Lecture4.305 min
-
Lecture4.405 min
-
Lecture4.505 min
-
Lecture4.605 min
-
Lecture4.705 min
-
Lecture4.805 min
-
Lecture4.905 min
-
Lecture4.1005 min
-
Lecture4.1105 min
-
Lecture4.1205 min
-
-
Module 5 3
Cybersecurity Laws
-
Lecture5.105 min
-
Lecture5.205 min
-
Lecture5.305 min
-
-
Module 6 1
Conclusion
-
Lecture6.105 min
-
-
Exam 1
-
Quiz7.130 questionsFinal
-
Data Breach
A data breach is one of the most common and neglected types of cyber threats. In literal words, a data breach is something that exposes sensitive and confidential data to someone who is not authorized to perceive subjected data. In simpler words, a data breach is an unpermitted view or sharing of unauthorized data. In today’s connected world, we all are facing the cyber threat of data breach because the more connected are we, the more is our exposure to the cyber world.
Generally, it is seen that data breach occurs due to two main weaknesses, i.e., user behavior and technology. With the advent of smart devices, we are providing more and more ways for the data to slip through. The technology is progressing at such a faster pace where we are unable to enact procedures to protect users and thus cuts the menace of the data breach. Moreover, as far as user behavior is concerned, the probability of a data breach depends greatly on how a user is interacting with internet-enabled devices. It has been found that hackers usually breach data via malware, brute force attacks, and phishing attacks. All of these tactics are the sheer products of social engineering and depends greatly on the user’s clicking cycle. So, the protection comes down to avoid clicking suspicious links, using strong passwords, and installing proactive antivirus software.