Examines strategies and technologies for protecting information systems, including encryption, access control, and security policies.