When using « standard » databases
Basic dataare organized in individual records, each record corresponding to an « owner ». Inside each record, data are not anonymous.
Each recordcontains an identifier, usually secured and encrypted.
This identifieris used by the system to know who is the «owner» of the data.
Hackersconcentrate their efforts on these identifiers, because once cracked, they yield immediately to the complete set of data.