Description
The purpose of this chapter is to discuss the techniques, challenges and best practices involved in the protection of information assets. Information should be protected at various points in its life cycle; notably, in process, in transit and at rest. Measures should be put in place to mitigate risk of information such as unauthorized access, use, disclosure, modification and destruction. Effective information protection requires a multidisciplinary approach involving people, processes and information technology and typically revolves around the objectives of confidentiality, integrity and availability (CIA).