Internet
Fact-checked

At EasyTechJunkie, we're committed to delivering accurate, trustworthy information. Our expert-authored content is rigorously fact-checked and sourced from credible authorities. Discover how we uphold the highest standards in providing you with reliable knowledge.

Learn more...

What Is a Computer Security Breach?

Christian Petersen
Christian Petersen

A computer security breach is an incursion into a computer or network of computers, usually by hackers or malicious software that compromises sensitive data or causes damage to computers or network function. Hackers and criminals use a number of tactics and techniques to bypass computer security measures to steal data, such as credit card information, bank information, social security numbers, and other personal information to use in fraudulent criminal acts. In some cases, the intent of a computer security breach is simply to cause damage. Malicious software, viruses, or other programs are inserted into a system with the aim of destroying data or damaging the ability of a computer or network to operate.

Hackers often break into systems in order to steal personal information to use in criminal enterprises, such as wire fraud or identity theft, often with no more effort than guessing a password. Credit card numbers, bank account numbers, social security numbers and other personal data are often the targets of a computer security breach. Attacks can be carried out by humans working alone or by the insertion of malicious software designed to steal data, gain access to data, or cause damage to computer systems.

Some computer security breaches have involved the theft of customers' financial information, including credit card numbers.
Some computer security breaches have involved the theft of customers' financial information, including credit card numbers.

Keystroke loggers are programs that, once inserted, can record what keys the users press, providing criminals with information about passwords or other data. Other programs can direct users to counterfeit websites where they are tricked into submitting personal information. Virus programs are designed to be destructive, causing damage to operating systems, data files, or otherwise reducing computer function. Other types of malicious software can copy and transfer large amounts of data.

Computer security breaches can cost millions of dollars in damage and may result in stiff penalties for the offender.
Computer security breaches can cost millions of dollars in damage and may result in stiff penalties for the offender.

Hackers can be very sophisticated or relatively unskilled amateurs, but even high school students working from a typical home computer can break into highly sensitive computer networks. Documented cases of minors breaking into school networks to steal information and change grades do exist, among hundreds of other similar breaches by individuals and highly organized rings of criminals at banks, financial institutions, government agencies, and private networks. In some cases, a computer security breach may be internal. For instance, an employee of a company may use his or her position and access to make unauthorized use of systems and data.

Social Security numbers may be the target of a computer security breach.
Social Security numbers may be the target of a computer security breach.

Computer security is an ongoing concern as hackers become more sophisticated and skilled. A primary problem with computer security systems is that, often, the only obstacle to a hacker or other unauthorized user is a password, which can be cracked, guessed, or otherwise bypassed by skilled attackers. Computer security technology is constantly evolving in an effort to thwart these attacks. Encryption systems for data transfer are becoming increasingly sophisticated. Firewalls and anti-virus programs are designed to stop incursions by many types of malicious software. Many systems have password entry management measures that lock out specific IP addresses or freeze access to an account if the wrong password is entered too many times.

Discussion Comments

Logicfest

@Soulfox -- It is true that Windows is targeted by hackers more than anything else. But, that only makes sense. Windows is the most popular desktop OS on the planet, so why wouldn't a hacker concentrate on an operating system that has something like 80 percent marketshare?

Soulfox

@Melonlity -- Of course, you could simply get away from Microsoft Windows because that is the operating system targeted by hackers more than crazy. From what I understand, Windows just isn't as secure as alternative operating systems such as Linux and Mac OS.

Linux is free and that might just be the thing to help make sure your computer is hacked and ruined.

Melonlity

This is precisely why it is important to get a good antivirus and malware package and make sure it is always active and up to date. It is an increasingly unsafe world out there in terms of the number of people who want to get into your computer and swipe account numbers and all sorts of things.

A good antivirus and malware package won't solve all of your problems, but it can help.

Post your comments
Login:
Forgot password?
Register:
    • Some computer security breaches have involved the theft of customers' financial information, including credit card numbers.
      By: Steve Cukrov
      Some computer security breaches have involved the theft of customers' financial information, including credit card numbers.
    • Computer security breaches can cost millions of dollars in damage and may result in stiff penalties for the offender.
      By: Ariusz
      Computer security breaches can cost millions of dollars in damage and may result in stiff penalties for the offender.
    • Social Security numbers may be the target of a computer security breach.
      By: JohnKwan
      Social Security numbers may be the target of a computer security breach.
    • Hackers focus on breaking into sensitive computer systems.
      By: corepics
      Hackers focus on breaking into sensitive computer systems.
    • A computer security breach may include someone gaining unauthorized access to a webcam.
      By: Devyatkin
      A computer security breach may include someone gaining unauthorized access to a webcam.
    • A computer security breach can occur if unauthorized users gain access to passwords and other confidential data.
      By: Edelweiss
      A computer security breach can occur if unauthorized users gain access to passwords and other confidential data.