Skip to main content

Security Threats: To Defend and Protect

  • Chapter
  • First Online:
How to Speak Tech

Abstract

In 2012, an attacker obtained around 8 million hashed passwords from LinkedIn and eHarmony. Before long, LinkedIn was confronted with a $5 million class-action lawsuit over its security practices. It seems as if every month a major security breach at some large company hits the news, alarming or harming users and driving them to seek minimal exposure and avoid openness. The Internet presents fields of opportunity for virtuous entrepreneurs and customers, but malicious people prowl the Internet too.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 19.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Open Web Application Security Project, “OWASP Top 10-2013: The Ten Most Critical Web Application Security Risks.” www.owasp.org/index.php/OWASP_Top_10.

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Vinay Trivedi

About this chapter

Cite this chapter

Trivedi, V. (2014). Security Threats: To Defend and Protect. In: How to Speak Tech. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4302-6611-2_12

Download citation

Publish with us

Policies and ethics