Chapter 15.1: Protecting People and the Organization from Specific Attack Methods