Match the law with the purpose. Ensures that federal government information systems and information have security protections commensurate with the risk and magnitude of the harm resulting from unauthorized access, use, disclosure, disruption, modification, or destruction 1. GLBA 2. FERPA Privacy of student education records 3. СОРPA Protects investors from the possibility of fraudulent accounting activities by corporations. 4. FISMA 5. SOX Act Requires banking and fınancial institutions to protect customers' private data and have proper security controls in place Protects children's personal information

Database System Concepts
7th Edition
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Chapter1: Introduction
Section: Chapter Questions
Problem 1PE
icon
Related questions
Question
100%
Match the law with the purpose.
Ensures that federal
government information
systems and information
have security protections
commensurate with the
risk and magnitude of the
harm resulting from
unauthorized access, use,
disclosure, disruption,
modification, or
1. GLBA
destruction
2. FERPA
Privacy of student
education records
3. COPPA
Protects investors from the
possibility of fraudulent
accounting activities by
corporations.
4. FISMA
5. SOX Act
Requires banking and
financial institutions to
protect customers' private
data and have proper
security controls in place
Protects children's personal
information
Transcribed Image Text:Match the law with the purpose. Ensures that federal government information systems and information have security protections commensurate with the risk and magnitude of the harm resulting from unauthorized access, use, disclosure, disruption, modification, or 1. GLBA destruction 2. FERPA Privacy of student education records 3. COPPA Protects investors from the possibility of fraudulent accounting activities by corporations. 4. FISMA 5. SOX Act Requires banking and financial institutions to protect customers' private data and have proper security controls in place Protects children's personal information
Expert Solution
steps

Step by step

Solved in 2 steps

Blurred answer
Knowledge Booster
Threats
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
Recommended textbooks for you
Database System Concepts
Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education
Starting Out with Python (4th Edition)
Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON
Digital Fundamentals (11th Edition)
Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON
C How to Program (8th Edition)
C How to Program (8th Edition)
Computer Science
ISBN:
9780133976892
Author:
Paul J. Deitel, Harvey Deitel
Publisher:
PEARSON
Database Systems: Design, Implementation, & Manag…
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781337627900
Author:
Carlos Coronel, Steven Morris
Publisher:
Cengage Learning
Programmable Logic Controllers
Programmable Logic Controllers
Computer Science
ISBN:
9780073373843
Author:
Frank D. Petruzella
Publisher:
McGraw-Hill Education