Chapter 14. Security and the Law

With the rash of cyberincidents that have taken a huge financial toll on governments and businesses over the last decade, legislators began to see that laws needed to be enacted to control the Wild West environment that existed in cyberspace. Laws have been enacted to protect privacy, infrastructure, people, companies, and just about anything that uses a computer or any form of computer technology. In this chapter, we discuss the most significant of those laws and how they affect corporate operations.

14.1. The 1996 National Information Infrastructure Protection Act

In 1996, when this law was passed, legislators were presented with some startling statistics. For example, the Computer Emergency and Response Team ...

Get Wireless Security: Know It All now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.