How Can Information Systems Be Protected