Category: 

What Is a Computer Security Breach?

Some computer security breaches have involved the theft of customers' financial information, including credit card numbers.
Social Security numbers may be the target of a computer security breach.
A computer security breach can occur if unauthorized users gain access to passwords and other confidential data.
Computer security breaches can cost millions of dollars in damage and may result in stiff penalties for the offender.
A computer security breach may include someone gaining unauthorized access to a webcam.
Hackers focus on breaking into sensitive computer systems.
Article Details
  • Written By: Christian Petersen
  • Edited By: Susan Barwick
  • Last Modified Date: 11 September 2014
  • Copyright Protected:
    2003-2014
    Conjecture Corporation
  • Print this Article
Free Widgets for your Site/Blog
The seahorse is among the only animals on Earth which has males bear the young.  more...

September 30 ,  1949 :  The Berlin Air Lift ended.  more...

A computer security breach is an incursion into a computer or network of computers, usually by hackers or malicious software that compromises sensitive data or causes damage to computers or network function. Hackers and criminals use a number of tactics and techniques to bypass computer security measures to steal data, such as credit card information, bank information, social security numbers, and other personal information to use in fraudulent criminal acts. In some cases, the intent of a computer security breach is simply to cause damage. Malicious software, viruses, or other programs are inserted into a system with the aim of destroying data or damaging the ability of a computer or network to operate.

Hackers often break into systems in order to steal personal information to use in criminal enterprises, such as wire fraud or identity theft, often with no more effort than guessing a password. Credit card numbers, bank account numbers, social security numbers and other personal data are often the targets of a computer security breach. Attacks can be carried out by humans working alone or by the insertion of malicious software designed to steal data, gain access to data, or cause damage to computer systems.

Ad

Keystroke loggers are programs that, once inserted, can record what keys the users press, providing criminals with information about passwords or other data. Other programs can direct users to counterfeit websites where they are tricked into submitting personal information. Virus programs are designed to be destructive, causing damage to operating systems, data files, or otherwise reducing computer function. Other types of malicious software can copy and transfer large amounts of data.

Hackers can be very sophisticated or relatively unskilled amateurs, but even high school students working from a typical home computer can break into highly sensitive computer networks. Documented cases of minors breaking into school networks to steal information and change grades do exist, among hundreds of other similar breaches by individuals and highly organized rings of criminals at banks, financial institutions, government agencies, and private networks. In some cases, a computer security breach may be internal. For instance, an employee of a company may use his or her position and access to make unauthorized use of systems and data.

Computer security is an ongoing concern as hackers become more sophisticated and skilled. A primary problem with computer security systems is that, often, the only obstacle to a hacker or other unauthorized user is a password, which can be cracked, guessed, or otherwise bypassed by skilled attackers. Computer security technology is constantly evolving in an effort to thwart these attacks. Encryption systems for data transfer are becoming increasingly sophisticated. Firewalls and anti-virus programs are designed to stop incursions by many types of malicious software. Many systems have password entry management measures that lock out specific IP addresses or freeze access to an account if the wrong password is entered too many times.

Ad

More from Wisegeek

You might also Like

Discuss this Article

Logicfest
Post 3

@Soulfox -- It is true that Windows is targeted by hackers more than anything else. But, that only makes sense. Windows is the most popular desktop OS on the planet, so why wouldn't a hacker concentrate on an operating system that has something like 80 percent marketshare?

Soulfox
Post 2

@Melonlity -- Of course, you could simply get away from Microsoft Windows because that is the operating system targeted by hackers more than crazy. From what I understand, Windows just isn't as secure as alternative operating systems such as Linux and Mac OS.

Linux is free and that might just be the thing to help make sure your computer is hacked and ruined.

Melonlity
Post 1

This is precisely why it is important to get a good antivirus and malware package and make sure it is always active and up to date. It is an increasingly unsafe world out there in terms of the number of people who want to get into your computer and swipe account numbers and all sorts of things.

A good antivirus and malware package won't solve all of your problems, but it can help.

Post your comments

Post Anonymously

Login

username
password
forgot password?

Register

username
password
confirm
email