CHAPTER
5 Security Breaches and the Law
ACCESS CONTROLS EXIST to reduce the risk of unauthorized access to valuable information and resources. The consequences of unauthorized access can be serious—loss of reputation, financial losses, and even the loss of life if military or infrastructure resources are compromised. In this chapter, you will discover the ways that compromised access controls can result in security breaches. You will also discover the legal implications of security incidents.
Chapter 5 Topics
This chapter covers the following topics and concepts:
What some U.S. federal and state laws that deter information theft are
What ...
Get Access Control, Authentication, and Public Key Infrastructure, 2nd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.