The Silent Killer
How Regulatory Compliance has Worsened the State of Information Security
Information in this chapter
• Regulatory Compliance Telemetry
• Transborder Data Flow Restrictions
• ISO Security Standards
• Health Insurance Portability and Accountability Act (HIPAA)
• Family Education Rights and Privacy Act (FERPA)
• Payment Card Industry Data Security Standard (PCI DSS)
• North America Electric Reliability Corporation: Critical Infrastructure Protection (NERC CIP)
Introduction
The cornerstone of information security is made up of three fundamental principals called the CIA Triad; confidentiality, integrity, and availability. Confidentiality is the prevention of disclosure of sensitive information to individuals not authorized to view ...
Get Cybercrime and Espionage now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.