Abstract
In 2012, an attacker obtained around 8 million hashed passwords from LinkedIn and eHarmony. Before long, LinkedIn was confronted with a $5 million class-action lawsuit over its security practices. It seems as if every month a major security breach at some large company hits the news, alarming or harming users and driving them to seek minimal exposure and avoid openness. The Internet presents fields of opportunity for virtuous entrepreneurs and customers, but malicious people prowl the Internet too.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Open Web Application Security Project, “OWASP Top 10-2013: The Ten Most Critical Web Application Security Risks.” www.owasp.org/index.php/OWASP_Top_10.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2014 Vinay Trivedi
About this chapter
Cite this chapter
Trivedi, V. (2014). Security Threats: To Defend and Protect. In: How to Speak Tech. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4302-6611-2_12
Download citation
DOI: https://doi.org/10.1007/978-1-4302-6611-2_12
Published:
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4302-6610-5
Online ISBN: 978-1-4302-6611-2
eBook Packages: Business and EconomicsBusiness and Management (R0)Apress Access Books