Datasheet

26
Part I: Building the Background
you’ve considered all the options. A much wider approach is needed, taking
into account such vital data-management activities as these:
Creating data-protection policies
Classifying your data
Organizing data storage into tiers
Archiving your data
Encrypting your data
Digital rights management
Discovery of confidential data
Applying data policies consistently
Technology by itself can prevent small-scale stuff — say, keep an engineer
from copying confidential CAD diagrams to a USB stick, or prevent a call-
center representative from inappropriately copying the customer database
to a CD-ROM or DVD. Technology can even manage offline machines and
remote office systems. And it can give on-screen warnings and notifications
to employees who attempt to violate a company’s data-leak prevention (DLP)
policies. What it can’t do is manage the growth and development of the
cyber-criminal’s arsenal, or catch and correct the inconsistent practices of
the end-user.
Much of what we do that’s called “user error” happens simply because we
don’t know what we’re doing wrong. One more thing technology can’t do:
Write the policies and procedures in the first place.
A mind map of data loss
The subject of data leaks is huge. You might think it impossible to put on
a single page — but we have: Figure 1-4 shows a mind map that provides
a bird’s-eye view of data loss. In essence, this diagram shows all the major
components that make up the data-loss problem. Each area is then subdi-
vided further. It’s an example of a holistic view — a Big Picture.
05_388433-ch01.indd 2605_388433-ch01.indd 26 1/23/09 9:36:08 PM1/23/09 9:36:08 PM