ABSTRACT

One of the major challenges for today’s IT security professional is having a strong awareness of the type of data and value of the data they are protecting. No matter how robust the technology, or how vigorous the monitoring systems, intellectual property (IP) can fi nd a way to leak onto less secure systems and devices for which they are not intended.