Abstract
In late July of 2017, credit reporting powerhouse Equifax disclosed that a group of unknown hackers had compromised the personal information—including driver’s license numbers and Social Security Numbers—of over 145 million customers. The attack was the latest in an ever-growing wave of public breaches and hacks that had already struck Target, Ashley Madison, and CitiGroup, among others. Millions of people were left vulnerable to identity theft, all due to one company’s negligence.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Alex Johnson, “Equifax breaks down just how bad last year’s data breach was,” NBC News, May 8, 2018. Available at https://www.nbcnews.com/news/us-news/equifax-breaks-down-just-how-bad-last-year-s-data-n872496 .
- 2.
Patricia de Saracho, “Cybersecurity, Information Security, Network Security, Information Assurance: What’s the Difference?” Security Magazine, September 6, 2018. Available at https://www.securitymagazine.com/blogs/14-security-blog/post/89383-cybersecurity-information-security-network-security-information-assurance-whats-the-difference .
- 3.
Full definition from Oxford English Dictionary for cybersecurity: “The state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this.”
- 4.
Charles Schmidt and Tom Darby, “What the Internet Worm did to systems,” The Morris Internet Worm. Available at https://snowplow.org/tom/worm/what.html .
- 5.
This framework for understanding cryptography dates back to the 1978 paper outlining the RSA cryptosystem. Alice and Bob, among a slew of other characters, show up in many texts about cybersecurity.
- 6.
Lorenzo Franceschi-Bicchierai, “How Hackers Broke Into John Podesta and Colin Powell’sGmail Accounts,” Motherboard - VICE, October 20, 2016. Available at https://motherboard.vice.com/en_us/article/mg7xjb/how-hackers-broke-into-john-podesta-and-colin-powells-gmail-accounts .
- 7.
“OWASP Top 10 - 2017: The Ten Most Critical Web Application Security Risks,” Open Web Application Security Project. Available at https://www.owasp.org/images/7/72/OWASP_Top_10-2017_%28en%29.pdf.pdf .
- 8.
“2016 Data Breach Investigations Report,” Verizon, April 2016. Available at http://www.verizonenterprise.com/resources/reports/rp_dbir-2016-executive-summary_xg_en.pdf .
- 9.
“The Password Exposé,” LastPass, November 1, 2017. Available at https://lp-cdn.lastpass.com/lporcamedia/document-library/lastpass/pdf/en/LastPass-Enterprise-The-Password-Expose-Ebook-v2.pdf .
- 10.
Lily Hay Newman, “Equifax Officially Has No Excuse,” WIRED, September 14, 2017. Available at https://www.wired.com/story/equifax-breach-no-excuse/ .
- 11.
Nicole Reineke, “Will Ransomware Start Targeting Enterprise Backups,” Unitrends. Available at https://www.unitrends.com/blog/will-ransomware-start-targeting-enterprise-backups .
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2019 Vinay Trivedi
About this chapter
Cite this chapter
Trivedi, V. (2019). Security. In: How to Speak Tech. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-4324-4_12
Download citation
DOI: https://doi.org/10.1007/978-1-4842-4324-4_12
Published:
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4842-4323-7
Online ISBN: 978-1-4842-4324-4
eBook Packages: Professional and Applied ComputingProfessional and Applied Computing (R0)Apress Access Books