Loading

From Exposure to Response: Understanding and Managing Data BreachesCROSSMARK Color horizontal
Raja Irfan Ahmad

Raja Irfan Ahmad, Multidisciplinary Research Unit (MRU), Sher-I Kashmir Institute of Medical Science, Soura, Srinagar, J&K, India.

Manuscript received on 05 January 2026 | First Revised Manuscript received on 02 February 2026 | Second Revised Manuscript received on 10 February 2026 | Manuscript Accepted on 15 February 2026 | Manuscript published on 28 February 2026 | PP: 11-21 | Volume-13 Issue-2, February 2026 | Retrieval Number: 100.1/ijies.C121715030226 | DOI: 10.35940/ijies.C1217.13020226

Open Access | Editorial and Publishing Policies | Cite | Zenodo | OJS | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open-access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: As the amount of data available to individuals, businesses, and governments on the internet increases, this may lead to data misuse. As the data available on the internet is in a huge volume, making any strategy that may be real-time or we think is effective regarding stopping or minimising data breaches is impractical. For individuals and organisations alike, the primary issue in the digital era is data breaches, which can affect any data available online. This review paper examines patterns in data breaches and their effects across sectors worldwide, as well as mitigation methods. existing This review paper aims to advance understanding of data breaches by considering case studies and the literature, and by outlining essential techniques/measure to enhance data security.

Keywords: Data Breach, Mitigation, Machine Learning, SPSS, Data Security, Personally Identifiable Information, Cybercriminals,
Scope of the Article: Computer Science and Engineering