Protection of Information

  • Tony Campbell


In this chapter we’ll look at some of the most well-known protection mechanisms that you can use to stop attackers from accessing your business’s most important information assets. We’ll discuss approaches you can take to valuing your data, including how to incorporate a classification scheme into your business in stages, so that the cost can be absorbed over a longer period of time. We’ll also look at some of the most commonly used defenses for building barriers around your data, keeping out those who are not authorized. We’ll finish off by looking at some of the more contemporary approaches used in information protection, such as digital rights management.


Access Control Information Classification Access Control Model Security Control Unix System 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Copyright information

© Tony Campbell 2016

Authors and Affiliations

  • Tony Campbell
    • 1
  1. 1.Burns BeachAustralia

Personalised recommendations