Identify the types of sensitive information contained in email messages and shared storage servers. Then, based on your knowledge of security management, describe techniques designed to protect the confidentiality, integrity, and availability of email and storage servers.