Cyber breach: Difference between revisions
From ACT Wiki
Jump to navigationJump to search
imported>Doug Williamson (Create the page. Source: The Treasurer, March 2017, p28.) |
imported>Doug Williamson (Add links.) |
||
(2 intermediate revisions by the same user not shown) | |||
Line 1: | Line 1: | ||
An incident in cyberspace which bypasses underlying security mechanisms in place to prevent unauthorised access to data, applications, services, networks or devices. | |||
==See also== | ==See also== | ||
*[[Cyber]] | |||
*[[Cyber attack]] | *[[Cyber attack]] | ||
*[[Cyber risk]] | *[[Cyber risk]] | ||
Line 9: | Line 10: | ||
*[[Cybercrime – A Threat And An Opportunity]] | *[[Cybercrime – A Threat And An Opportunity]] | ||
*[[Cyber security: protecting your business and your clients]] | *[[Cyber security: protecting your business and your clients]] | ||
* [[Data breach]] | |||
* [[Data protection ]] | |||
* [[Data Protection Act]] | |||
* [[Data Protection Authority]] | |||
* [[Data Protection Officer]] | |||
* [[General Data Protection Regulation]] (GDPR) | |||
[[Category:Financial_risk_management]] | |||
[[Category:Technology]] |
Latest revision as of 12:07, 13 July 2022
An incident in cyberspace which bypasses underlying security mechanisms in place to prevent unauthorised access to data, applications, services, networks or devices.