Criticality of E-Privacy and Data Leakage Amid the Pandemic: Privacy-Preserving Techniques and Frameworks

Criticality of E-Privacy and Data Leakage Amid the Pandemic: Privacy-Preserving Techniques and Frameworks

Gaurav Roy
DOI: 10.4018/978-1-7998-7188-0.ch013
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

The global pandemic has led to an undeniable surge in using digital technologies due to the social distancing norms and nationwide lockdowns. Firms and organizations are conforming to the new culture of work and life. The use of internet services, digital devices, and cloud systems has seen surges in usage from 40% to 100%, compared to pre-lockdown levels. With the rapid growth of this technological use, people are exposing their digital assets, presence, and behavior out to the binary world where AI-driven data analysis algorithms, data-gathering systems, and spyware are continuously monitoring their behavior. These subconsciously exposed data are then carried forward for delivering customized ads and recommend features.
Chapter Preview
Top

Data Breach And E-Behavior Leakage

A data breach is a form of cyber-attack that might change the course of your life or change the revenue graph of any business. Yes, it's the most vulnerable and attractive attack that intentionally and unintentionally makes an attacker release private or sensitive credentials to any untrusted digital ecosystem. Through this process, the cybercriminal gains monetary and other benefits by leaking the sensitive credentials of the victim. You might have heard about sensitive data disclosure, unintentional information disclosure, massive data leak, info leak, delicate data spill, and terms like this. Yes, all of them belong to the data breach. Most organized crimes also leverage the use of data breaches. During this attack process, cybercriminals extract the protected and sensitive data such as credit card information, personal health information (PHI), financial records, Personal Identifiable Information (PII), trade secrets, bank details, project plans, stat reports, behavioral analysis data, and other vulnerable unstructured data, files, or documents.

Complete Chapter List

Search this Book:
Reset