ASIS CPP - Information Security Flashcards
Protecting Information
Information Categories
Sensitive and proprietary information
Privacy-protected data
Intellectual property
Intangible assets
Information defined under international, federal, and state laws governing trade secrets, patents, and copyrights
Protecting Information
Basic principles of effective protection
- Classification and labeling
- Handling protocols to specify use, distribution, storage, security expectations, declassification, return, and destruction/disposal methodology
- Training
- Incident reporting and investigation
- Audit/compliance processes and special needs (disaster recovery)
Protecting Information - Information Assets
What is the second most valuable resource after employee?
Corporate Knowledge
Protecting Information - Information Assets
Intangible rights protecting commercially valuable products of intellect?
Intellectual Property Rights (IRR)
Trademark | Copyright | Patent | TradeSecrets | PublicityRights | MoralRights | Rights against unfair competition
Protecting Information - Information Assets
Excludes others from making, using, offering for sale, or selling an invention for 20 years
Patents
Protecting Information - Information Assets
The owner must take reasonable measures to keep the information secret
Must derive independent economic value, actual or potential, from not being generally known and not being readily ascertainable through proper means by the public
Trade Secret
Protecting Information - Information Assets
For information to be considered a trade secret, the owner must be able to prove…
- The information added value or benefit to the owner
- The trade secret was specifically identified
- The owner provided a reasonable level of protection
A robust security program and strict protection measures clearly and consistently defined, communicated, and enforced
Protecting Information - Information Assets
Patents vs. Trade secrets
- An inventor may protect an invention by patenting it or by deeming it a trade secret
- Patents require public disclosure and last only 20 years
- A trade secret is not disclosed and may last indefinitely
- Stealing a trade secret may violate criminal laws but there are no criminal laws regarding patent infringement
Protecting Information - Information Assets
A proprietary right or other valid economic interest in data resulting from private investment
Proprietary Information
Protecting Information - Information Assets
- Protects the expression of ideas in literary, artistic, and musical works
- Under international law, copyrights do not have to be registered to be protected
- An author or copyright holder can formalize ownership through government registration, which may help in any later enforcement actions
Copyright
Protecting Information - Information Assets
Name, phrase or other device used to identify and distinguish the services of a certain provider
Service Mark
Protecting Information - Information Assets
Word, phrase, logo or other graphic symbol used by a manufacturer or seller to distinguish its product from others
Consists of words, names, symbols, devices, or images applied to products or used in connection with goods or services to identify their source
Trade Mark
Protecting Information - Information Assets
It is intellectual property owner’s responsibility to understand and comply with the requirements related to protecting patent, trademark and copyrights in each relevant jurisdiction
Protecting Information - Information Risk Assessment
A thorough and tailored risk assessment is the foundation for the development of an overall IAP strategy
Protecting Information - Information Risk Assessment
The goal of risk management and the security program is…
to optimize risk, never to minimize it
Protecting Information - Information Risk Assessment
In basic risk management, how much one should spend to prevent an information security incident equals the probability of the incident times its cost
Protecting Information - Information Risk Assessment
Too often there is an over-emphasis on dollar values as the only metric in a risk analysis
- May discourage the consideration of non-tangible measures of factors that cannot be easily quantified
- Qualitative risk analysis are sometimes more appropriate and should be considered in lieu of or in addition to quantitative analysis
Protecting Information - OPSEC
What was developed in the military to protect unclassified information that could reveal sensitive plans and operations?
A Protection Approach
Protecting Information - OPSEC
OPSEC calls for…
Viewing the big picture and identifying any protection gaps that remain despite current security measures
Protecting Information - OPSEC
OPSEC responds to the fact that small bits of information taken from several different sources can be combined to reveal sensitive information
Protecting Information - OPSEC
OPSEC or information risk management should be practiced in organizations of all sizes, but it is particularly valuable for smaller businesses that may not have a large security or IAP staff or a great deal of security resources
Protecting Information - OPSEC
A simple and systematic method of employing safeguards to protect critical information; the process includes five cyclical steps
- Identify assets (critical information
- Define the threat (collectors, capabilities, motivations)
- Assess vulnerabilities
- Analyze the risk (impact, priority, existing countermeasures, etc)
- Develop and implement countermeasures
Protecting Information - Information Threats
Categories of Information Threats
Intentional
Natural
Inadvertent
Protecting Information - Information Threats
Top business impacts of information loss…
- Loss of company reputation/image/goodwill
- Loss of competitive advantage in on product/service
- Reduced projected/anticipated returns or profitability
- Loss of core business technology or process
- Loss of competitive advantage in multiple products/services
Protecting Information - Information Threats
Today information assets compromised are almost always impossible to recall or contain in terms of dissemination - They can be anywhere or everywhere in an instant
Protecting Information - Information Threats
Perhaps the most frequently overlooked threats are inadvertent threats
Protecting Information - Information Threats
Insider espionage is facilitated by…
- Advanced information storage and retrieval results in easier access
- A broader range of foreign buyers is more accessible than ever
- International collaboration places more employees in strategic positions to work with foreign personnel
- Opportunities to transfer information increase with increasing rates of foreign travel
Protecting Information - Information Threats
Insider espionage ctd…
- Abundant financial burdens for Americans make them more prone to compromise
- Debts increased by easy access to gambling sources will make Americans more prone to compromise
- Reduced loyalty between organizations and employees generates motivation
- Ethnic ties produce opportunities and motivation in American employees
- Commitment to the “global community” and common good motivates the desire to share information
Protecting Information - Information Threats
A virtual threat (“ghost”) does one or more of three functions:
- Sends information to its control (owner of the threat software)
- Receives commands from its control
- Executes commands where it is installed
Protecting Information - Information Vulnerabilities
Trade shows are a traditional venue for business and government intelligence collection
Protecting Information - Information Vulnerabilities
Virtual threats take advantage of flaws, or vulnerabilities, in a complex source code
Protecting Information - Information Vulnerabilities
One business activity that raises special risks to a company’s information is the establishment of relationships with other companies, domestically or internationally
(such as partnerships or outsourcing agreements)
Protecting Information - Information Vulnerabilities
IT threats cannot manifest without a vulnerability to exploit, which are in five categories
- Vulnerabilities in the information systems infrastructure
- Vulnerabilities in people using the information systems infrastructure
- Vulnerabilities in people maintaining the information systems infrastructure
- Vulnerabilities in information systems management processes
- Executive and senior management vulnerabilities
Protecting Information
Access control databases are vulnerable in two ways
- Administrative misconduct
- Attack from an outside connection (internet)
Protecting Information
The physical access control network is generally made up of two parts
- The connection between the reader and a controller
- The TCP/IP network on which controllers talk to servers and users talk to servers
Protecting Information
A legacy HID (Hughes identification device) card has two components
- The secret facility number, or facility code, which is not printed on the card but is known to the facility owner
- An identification number that is printed on the card
Protecting Information
A tool called gecko, which can be built for $10 worth of parts, can give an intruder complete control over a door by compromising the Weigand text stream sent from the reader to the controller