Sensitive Data Exposure occurs when sensitive information, such as passwords, credit card details, or personal data, is not properly protected during storage or transmission. Weak encryption, improper key management, or lack of HTTPS for data in transit are common causes. An attacker can intercept such data using tools like packet sniffers or by exploiting vulnerabilities in the system. For example, an application storing user passwords in plain text instead of hashing them exposes users to credential theft if the database is compromised. Proper encryption, secure transmission (e.g., HTTPS), and adherence to best practices mitigate this risk. Why Other Options Are Incorrect :
Who led the English forces to victory in the Battle of Bedara against the Dutch in Bengal, securing British dominance in the region?
With reference to Mughal Kingdom after Aurangzeb, consider the following:
1. Bahadur Shah I (1707-1712) adopted a confrontationist policy towar...
Who was the first woman to become the Prime Minister of India.
Who built the Tower of Victory (Vijay Stambha) in the Chittor Fort?
What does the term ‘dastak’ refer to?
Which of the following statements is/are not correct with reference to Mundra Port:
Recently it completed...
Which of the given statements is/are the after effects of the Quit India movement?
1. After the Quit India Movement, the British realized that...
The system of "Communal Electorate" was first introduced in India by which British Act?
Which was the first National Movement in which women's participation was really very notable?
Who amongst the following was related to the ‘Blue Water policy' which aimed to make European power as the master of the Indian Ocean?