Abstract
Throughout the remainder of this book, we will operate under the central premise that every organization across the globe has too much information flowing throughout their environment for it to be feasible to monitor the content and context of everything that is transferred. Due to the volume of electronic information, should an organization choose to attempt monitoring of every transmission, half or more of the organization’s staff would be dedicated to the effort. If it is, in fact, infeasible to monitor everything, how do we separate the wheat from the chaff? Content and content aware tools have become indispensable for organizations to identify, monitor, and protect what is most important to them, but many struggle to use them effectively.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2016 Jeremy Wittkop
About this chapter
Cite this chapter
Wittkop, J. (2016). Protecting Critical Assets. In: Building a Comprehensive IT Security Program. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-2053-5_2
Download citation
DOI: https://doi.org/10.1007/978-1-4842-2053-5_2
Published:
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4842-2052-8
Online ISBN: 978-1-4842-2053-5
eBook Packages: Professional and Applied ComputingApress Access BooksProfessional and Applied Computing (R0)