This chapter provides an overview of data security controls and data handling using a high-level illustration. Data can exist in different states in an organization. It can be in e-mails, stored on a USB stick, printed on paper, or spoken in conversations. Hence, in any of these states, appropriate security controls are necessary to protect such information assets.
The following topics are covered in this chapter: