In the fourth part of our series on information security, we set out the next step for you to consider: What information security goal do you seek to achieve? This might be confidentiality, integrity, availability, or anonymity. You should decide on a primary goal for each of your most valuable and sensitive information assets. You can then implement security measures to achieve this goal.