Protection of People
In this chapter we’ll look at some of the most well-known protection mechanisms that you can use to stop attackers from accessing your business’s most important information assets. We’ll discuss approaches you can take to valuing your data, including how to incorporate a classification scheme into your business in stages, so that the cost can be absorbed over a longer period of time. We’ll also look at some of the most commonly used defenses for building barriers around your data, keeping out those who are not authorized. We’ll finish off by looking at some of the more contemporary approaches used in information protection, such as digital rights management.