}
Know How

Digital Communication Security

Step 2: Classification

There is both our information and that of our organisation, which cannot ever be exposed! What are the first five vulnerable sources of information that come to mind? Try listing them to identify where they are stored. Use the strategy model below. The video explains the connection between data storage and power.

Strategy model:
Strategy model