Chapter 15.2: Protecting People and the Organization from Specific Attack Methods