© Stephen Haunts 2019
Stephen HauntsApplied Cryptography in .NET and Azure Key Vaulthttps://doi.org/10.1007/978-1-4842-4375-6_1

1. What Are Data Breaches?

Stephen Haunts1 
Belper, Derbyshire, UK

We live in a technical society that is both exciting and terrifying at the same time. Never before have we had instant access to information and services at the touch of a button—from the devices we carry in our pockets, the computers on our desks, or the TVs in our houses. While this unprecedented level of access to online services is exciting, it also brings a lot of personal risks. To access these services, we have to give up our information to companies that we must entrust with it. Unfortunately, although we trust these companies with our data, we ...

Get Applied Cryptography in .NET and Azure Key Vault: A Practical Guide to Encryption in .NET and .NET Core now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.