Security Threats: To Defend and Protect
Vinay Trivedi
Chapter Chapter 12 in How to Speak Tech, 2014, pp 113-120 from Springer
Abstract:
Abstract In 2012, an attacker obtained around 8 million hashed passwords from LinkedIn and eHarmony. Before long, LinkedIn was confronted with a $5 million class-action lawsuit over its security practices. It seems as if every month a major security breach at some large company hits the news, alarming or harming users and driving them to seek minimal exposure and avoid openness. The Internet presents fields of opportunity for virtuous entrepreneurs and customers, but malicious people prowl the Internet too.
Keywords: Hash Function; Identity Theft; Secure Socket Layer; Transport Layer Security; Attack Surface (search for similar items in EconPapers)
Date: 2014
References: Add references at CitEc
Citations:
There are no downloads for this item, see the EconPapers FAQ for hints about obtaining it.
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:spr:sprchp:978-1-4302-6611-2_12
Ordering information: This item can be ordered from
http://www.springer.com/9781430266112
DOI: 10.1007/978-1-4302-6611-2_12
Access Statistics for this chapter
More chapters in Springer Books from Springer
Bibliographic data for series maintained by Sonal Shukla () and Springer Nature Abstracting and Indexing ().