Contributed by Dr Stephen Hitchen
Corporate intellectual property and other sensitive information is generally created and maintained in the form of electronic documents. Encryption is routinely used to protect this information against unauthorised access during storage and transfer (e.g. by email). While encrypted, the protected information, or content, is essentially immune to unauthorised access. It may seem, therefore, that the application of modern encryption software provides perfectly adequate protection of such information. However, such a view is superficial – in essence it focuses on only one aspect of securing sensitive information.
This document is in PDF format. To view it click here.