EconPapers    
Economics at your fingertips  
 

Security Threats: To Defend and Protect

Vinay Trivedi

Chapter Chapter 12 in How to Speak Tech, 2014, pp 113-120 from Springer

Abstract: Abstract In 2012, an attacker obtained around 8 million hashed passwords from LinkedIn and eHarmony. Before long, LinkedIn was confronted with a $5 million class-action lawsuit over its security practices. It seems as if every month a major security breach at some large company hits the news, alarming or harming users and driving them to seek minimal exposure and avoid openness. The Internet presents fields of opportunity for virtuous entrepreneurs and customers, but malicious people prowl the Internet too.

Keywords: Hash Function; Identity Theft; Secure Socket Layer; Transport Layer Security; Attack Surface (search for similar items in EconPapers)
Date: 2014
References: Add references at CitEc
Citations:

There are no downloads for this item, see the EconPapers FAQ for hints about obtaining it.

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:spr:sprchp:978-1-4302-6611-2_12

Ordering information: This item can be ordered from
http://www.springer.com/9781430266112

DOI: 10.1007/978-1-4302-6611-2_12

Access Statistics for this chapter

More chapters in Springer Books from Springer
Bibliographic data for series maintained by Sonal Shukla () and Springer Nature Abstracting and Indexing ().

 
Page updated 2025-04-02
Handle: RePEc:spr:sprchp:978-1-4302-6611-2_12