Cost-effective controls to provide confidentiality require valuing the information that is to be protected. This involves classifying the information into discrete categories. Propose a minimal classification scheme that can be used to protect any business and provide examples of the type of information that would fall into each category.