Skip to main content

What Are Data Breaches?

  • Chapter
  • First Online:
Applied Cryptography in .NET and Azure Key Vault

Abstract

We live in a technical society that is both exciting and terrifying at the same time. Never before have we had instant access to information and services at the touch of a button—from the devices we carry in our pockets, the computers on our desks, or the TVs in our houses. While this unprecedented level of access to online services is exciting, it also brings a lot of personal risks. To access these services, we have to give up our information to companies that we must entrust with it. Unfortunately, although we trust these companies with our data, we are continually hearing in the news about data accounts being stolen. In this chapter we will explore what data breaches are, their impacts, and then set the expectation for the rest of the book.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 29.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 37.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Stephen Haunts

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Haunts, S. (2019). What Are Data Breaches?. In: Applied Cryptography in .NET and Azure Key Vault. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-4375-6_1

Download citation

Publish with us

Policies and ethics