Ideally, content protection should incorporate four complementary types of protection. Physical security should control access to the asset. Encryption should protect the asset itself. Forensics technology should trace the asset. Scouting should limit the illegal use of the asset. This chapter introduces basic technologies to fulfill these protections: cryptography, digital watermarking, hardware and software tamper resistance, as well as compliance and robustness regimes.