In general, there are four major approaches that can be taken to ensure the integrity of an information system. These are
containment, deterrence, obfuscation and recovery. Although each strategy is discussed separately, it is important to note
that an effective security policy will draw upon a variety of concepts and techniques.