Abstract
According to the Privacy Rights Clearinghouse, more than 535 million records with sensitive information have been breached since January 2005. If you browse through the detailed report at www.privacyrights.org/ar/ChronDataBreaches.htm, you’ll see that there are many kinds of breaches of stolen data. In some cases, there were stolen laptops; in others, it was in inside job by a disgruntled employee. This report yields an almost endless supply of breaches and stolen data.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Rights and permissions
Copyright information
© 2012 Rob Walters, Grant Fritchey
About this chapter
Cite this chapter
Walters, R., Fritchey, G. (2012). Auditing, Encryption, and Compliance. In: Beginning SQL Server 2012 Administration. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4302-3982-6_12
Download citation
DOI: https://doi.org/10.1007/978-1-4302-3982-6_12
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4302-3981-9
Online ISBN: 978-1-4302-3982-6
eBook Packages: Professional and Applied ComputingProfessional and Applied Computing (R0)Apress Access Books