Fourth Defensive Layer: You'll Need That Secret Decoder Ring

Imagine for a second that an attacker has targeted you and has managed to penetrate all three of the layers in this chapter that you have prepared. All that is left is the asset your organization holds most dear: its data – information on its payroll and financial health, intellectual property, proprietary product data, and documented analysis of your competitors. The last thing you will want is this most valuable asset being left bare for all to see (and take). There is one last line of defense that you can implement to safeguard your files: data encryption. The use of encryption technology would have prevented the disgruntled patron of Casa de Marginal in Scenario 2 (Attacking Customer ...

Get Seven Deadliest Microsoft Attacks now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.