Abstract
In this chapter we’ll look at some of the most well-known protection mechanisms that you can use to stop attackers from accessing your business’s most important information assets. We’ll discuss approaches you can take to valuing your data, including how to incorporate a classification scheme into your business in stages, so that the cost can be absorbed over a longer period of time. We’ll also look at some of the most commonly used defenses for building barriers around your data, keeping out those who are not authorized. We’ll finish off by looking at some of the more contemporary approaches used in information protection, such as digital rights management.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2016 Tony Campbell
About this chapter
Cite this chapter
Campbell, T. (2016). Protection of People. In: Practical Information Security Management. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-1685-9_8
Download citation
DOI: https://doi.org/10.1007/978-1-4842-1685-9_8
Published:
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4842-1684-2
Online ISBN: 978-1-4842-1685-9
eBook Packages: Professional and Applied ComputingProfessional and Applied Computing (R0)Apress Access Books