Nowadays, the assets of an organization are assessed not only through physical possessions but also by the information they have. Information is prone to threat as are the other assets of every organization. These threats include attack from outsiders or insiders who may intend to affect the passive defense (security, safety and survivability) of the information assets an organization possesses. One of the threats to which information assets are exposed to is information compromise, the threat that causes unauthorized disclosure of confidential information. There are various ways for information compromise, therefore; it is necessary to identify and properly organize sensitive information in order to reduce the threats made by the information compromise events. The sensitive information should be protected using security tools known as DLP methods that are developed by security providers.
Hasannia, M. H., & Dehghani, M. (2014). Examining the Methods of Information Compromise and its Countermeasures Techniques. Passive Defense, 4(4), 1-12.
MLA
M. H. Hasannia; M. Dehghani. "Examining the Methods of Information Compromise and its Countermeasures Techniques", Passive Defense, 4, 4, 2014, 1-12.
HARVARD
Hasannia, M. H., Dehghani, M. (2014). 'Examining the Methods of Information Compromise and its Countermeasures Techniques', Passive Defense, 4(4), pp. 1-12.
VANCOUVER
Hasannia, M. H., Dehghani, M. Examining the Methods of Information Compromise and its Countermeasures Techniques. Passive Defense, 2014; 4(4): 1-12.