Cyber breach: Difference between revisions
From ACT Wiki
Jump to navigationJump to search
imported>Doug Williamson m (Categorise.) |
imported>Doug Williamson (Add links.) |
||
Line 3: | Line 3: | ||
==See also== | ==See also== | ||
*[[Cyber]] | |||
*[[Cyber attack]] | *[[Cyber attack]] | ||
*[[Cyber risk]] | *[[Cyber risk]] | ||
Line 9: | Line 10: | ||
*[[Cybercrime – A Threat And An Opportunity]] | *[[Cybercrime – A Threat And An Opportunity]] | ||
*[[Cyber security: protecting your business and your clients]] | *[[Cyber security: protecting your business and your clients]] | ||
* [[Data breach]] | |||
* [[Data protection ]] | |||
* [[Data Protection Act]] | |||
* [[Data Protection Authority]] | |||
* [[Data Protection Officer]] | |||
* [[General Data Protection Regulation]] (GDPR) | |||
[[Category:Financial_risk_management]] | [[Category:Financial_risk_management]] | ||
[[Category:Technology]] | [[Category:Technology]] |
Latest revision as of 12:07, 13 July 2022
An incident in cyberspace which bypasses underlying security mechanisms in place to prevent unauthorised access to data, applications, services, networks or devices.