What Forms do Security and Privacy Breaches take?

A breach can happen because of many different factors. They can be intentional attacks or innocent mistakes. In 2014, cyber breaches were classified into nine categories. Below these categories are listed and a brief description of each one is provided.

POS Intrusions
Remote attack against the place where retail transactions occur, specifically where cards are used.

Crime ware
Malware infections within organizations that isn’t associated with more specialized classification patterns.

Cyber-Espionage
Thieves use computer networks to gain access to confidential information. Typically this crime is used to access high-profile information.

Insider Misuse
Employee with access to passwords and other security information abuses the access they’ve been privileged with, usually for personal gain.

Web App Attacks
Stealing info from customer devices and then logging into their web applications using these stolen credentials.

Miscellaneous Errors
Errors made by internal staff, especially system administrators, that lead to the exposure of private data.

Physical Theft or Loss
Devices in the workplace go missing and thieves are able to use them.

Payment Card Skimmers
Thieves put very thin skimmers inside the card reader slots and capture future customer data.

Denial of Service
A malicious attempt to make a server or a network resource unavailable to users, usually by temporarily interrupting or suspending the services of a host connected to the Internet.

The above incidents appear in order of the frequency that they occurred in 2014. POS intrusions were the most frequent attacks as retail outlets were targeted regularly.