School of Information Systems

What is Breaches in Access Control(2)

Effect of Breaches in Access Control

Here are some of the Effect that Breaches in Access Control do to a company:

  • Disclosure of private information

With the Breach of the Access Control, the breacher could get a valuable data of the company customer private information. Then god knows what they’re going to do with it.

  • Corruption of data

Corruption of data refers to errors in computer data that occur during writing, reading, storage, transmission, or processing, which introduce unintended changes to the original data. Computer, transmission, and storage systems use a number of measures to provide end-to-end data integrity, or lack of errors. In general, when data corruption occurs a file containing that data will produce unexpected results when accessed by the system or the related application. Results could range from a minor loss of data to a system crash

  • Loss of business intelligence

The company BI is the most valuable information for the company there is, it allows company to make more effective strategic, tactical, and operational insights and decision-making. Now when the access control is breached, the breacher will get all that valuable information and probably can sell it to the company competitor

  • Danger to facilities, staff, and systems

When the breacher done with breaching an Access Control, they gain access to change or modify the facilities, staff, or even the systems. They can easily change it, thus will make danger to the company

  • Damage to equipment

Damage of equipment as a result of a breach a risk far less likely to be covered under a cybersecurity insurance policy. For example, a hacker could access a web-connected appliance and potentially disable its temperature controls, overheat the appliance and cause a fire, or exploit a vulnerability in a driverless car’s control system, take control of the car and crash it.

  • Failure of systems and business processes

When it comes to breaches, hackers and organized crime garner most of the headlines, but most data breaches are caused by human errors and system glitches application failures, inadvertent data dumps, logic errors in data transfer and more & that cause of failure in business process. Firstly, there is the possibility that the Internet connection that remote workers use to access the work system is not secure. This problem is less significant when using a home network but is magnified when remote workers access the work system using public WiFi. A competent hacker can easily access backdoors in public WiFi, install keystroke loggers, and cause damage to the victim’s computer.

Another security threat arises when the remote worker’s device becomes stolen. If the victim is logged into a work account, the chances of a competent hacker obtaining access to sensitive data are increased.


Irfan Arsyad, Muhammad Ragil