Names and other identifying information are kept confidential.
Examples include keeping the employee phone book and organizational chart
from being released to those who might abuse its content, keeping filenames
and machine names containing confidential data confidential to make them
harder to find, and keeping the names of clients, projects, and other
operational information confidential to prevent exploitation.
Complexity: Operations security is a complex field - in large part because
of the effects of data aggregation.
fc@red.a.net