Skip to Main Content
Wireless Security: Know It All
book

Wireless Security: Know It All

by Praphul Chandra, Frank Thornton, Chris Lanthem, Jon S. Wilson, Dan Bensky, Tony Bradley, Chris Hurley, Steve A. Rackley, John Rittinghouse PhD CISM, James F. Ransome PhD CISM CISSP, Timothy Stapko, George L Stefanek
April 2011
Intermediate to advanced content levelIntermediate to advanced
744 pages
21h 41m
English
Newnes
Content preview from Wireless Security: Know It All

Chapter 14. Security and the Law

With the rash of cyberincidents that have taken a huge financial toll on governments and businesses over the last decade, legislators began to see that laws needed to be enacted to control the Wild West environment that existed in cyberspace. Laws have been enacted to protect privacy, infrastructure, people, companies, and just about anything that uses a computer or any form of computer technology. In this chapter, we discuss the most significant of those laws and how they affect corporate operations.

14.1. The 1996 National Information Infrastructure Protection Act

In 1996, when this law was passed, legislators were presented with some startling statistics. For example, the Computer Emergency and Response Team ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Wireless and Mobile Device Security

Wireless and Mobile Device Security

Jim Doherty
802.11 Security

802.11 Security

Bob Fleck, Bruce Potter
Securing the Internet of Things

Securing the Internet of Things

Shancang Li, Li Da Xu

Publisher Resources

ISBN: 9781856175296