5  Security Breaches and the Law

ACCESS CONTROLS EXIST to reduce the risk of unauthorized access to valuable information and resources. The consequences of unauthorized access can be serious—loss of reputation, financial losses, and even the loss of life if military or infrastructure resources are compromised. In this chapter, you will discover the ways that compromised access controls can result in security breaches. You will also discover the legal implications of security incidents.

Chapter 5 Topics

This chapter covers the following topics and concepts:

Image What some U.S. federal and state laws that deter information theft are

What ...

Get Access Control, Authentication, and Public Key Infrastructure, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.