5 Security Breaches and the Law
ACCESS CONTROLS EXIST to reduce the risk of unauthorized access to valuable information and resources. The consequences of unauthorized access can be serious—loss of reputation, financial losses, and even the loss of life if military or infrastructure resources are compromised. In this chapter, you will discover the ways that compromised access controls can result in security breaches. You will also discover the legal implications of security incidents.
Chapter 5 Topics
This chapter covers the following topics and concepts:
What some U.S. federal and state laws that deter information theft are