02.05.2018 Views

Indagard Insurance Services Guide to Cyber Risk and Insurance

A helpful guide to how the Notifiable Data Breach scheme affects your business, the threats of cyber risk and the role insurance plays to keeping your business open for business.

A helpful guide to how the Notifiable Data Breach scheme affects your business, the threats of cyber risk and the role insurance plays to keeping your business open for business.

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

INDAGARD INSURANCE SERVICES<br />

SQL Injection Attack<br />

St<strong>and</strong>ard query language (SQL) is a management language<br />

that is used <strong>to</strong> query <strong>and</strong> h<strong>and</strong>le information within<br />

databases.<br />

In an SQL Injection attack, the attacker will use code <strong>to</strong><br />

“trick” a database in<strong>to</strong> providing them sensitive or valuable<br />

information by exploiting vulnerabilities in the system.<br />

Before you have any chance of reacting, the attacker has<br />

copied this information from your database <strong>and</strong> now has<br />

full access <strong>to</strong> it.<br />

Imagine if your system s<strong>to</strong>red medical files, credit card<br />

details, or tax file numbers <strong>and</strong> fell victim <strong>to</strong> this kind of<br />

attack!<br />

Social engineering<br />

Social engineering involves an elaborate ploy <strong>to</strong><br />

manipulate an individual in<strong>to</strong> giving up sensitive<br />

information.<br />

<strong>Cyber</strong> attackers will use human interaction <strong>to</strong> coerce<br />

the individual <strong>to</strong> break procedure <strong>and</strong> either directly or<br />

indirectly give them access <strong>to</strong> valuable information.<br />

Attackers often use tactics that, on the surface, seem<br />

completely innocent <strong>and</strong> harmless but that, in actuality,<br />

can seriously jeopardize the safety of your data.<br />

A CYBER INSURANCE GUIDE - PAGE 15

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!