Refers to the processes and tools designed and deployed to protect sensitive business information from modification, disruption, destruction, and inspection.