75% of case study answer perpetrators stole fabric to which they were granted entry in case study answer course of employment and trade secrets and techniques were unlawfully taken in 52% of case look at solution thefts. Furthermore, most insider thieves of intellectual assets were caught by non technical staff contributors. It will also be concluded that data breaches are an often happening phenomena, and that not just CISOs’ and other employees in charge of advice security must undertake measures to reap case examine answer goals of InfoSec but in addition that non technical personnel in companies shall be conscious about case examine solution risks and knowledgeable in maintaining case study solution CIA ideas in case look at answer path of their employment. This is in order most criminals or cyber criminals carry out their attack as a result of they see an easy prey of their objectives as their protection is unfastened. Staff from all degrees of case study solution organization’s hierarchy shall take measures to stay away from theft, loss and take most economical measures to give protection to case look at answer confidential assistance they’ve been granted entry to for case study answer success of their responsibilities. Below is a demonstration of case look at solution top five layers that counsel safeguard offers when it comes to reaching case study answer aims specified by case study answer CIA triad.