
12
CHAPTER 1: THE DAILY BREACH
The year is 2013: society has woken up to the
challenges of information security, and media
reports about data or information security
breaches
2
are common. In fact, the media is so full
of these reports that a new day usually brings a
new breach with it. Breaches come in many shapes
and sizes, from rather harmless website
defacements perpetrated by hacktivist groups or
bored, gifted youngsters, to data being accidentally
exposed, to data being stolen by professional
crackers and later traded in the black market or
used to blackmail the company. Carelessness in
processes, procedures and technical configurati ...