CPP 2012 Domain 6: Information Security Flashcards
What are the three threat categories in information asset protection?
Intentional,
Natural,
Inadvertent.
Source: POA: Information Security, 1.3.2, pages 5-6
What kinds of companies are particularly vulnerable to counterfeiting and piracy?
Startups,
Early stage firms,
Small and medium-size companies that are rich in intangible assets.
Source: POA: Information Security, 1.3.2, page 9
According to the FBI, what are the six steps of protecting a business from espionage?
Recognize the (insider or outsider) threat,
Identify and valuate trade secrets,
Implement a proactive plan for protecting trade secrets,
Secure physical and electronic versions of trade secrets,
Confine intellectual knowledge to “need to know,”
Train employees on intellectual property protection.
Source: POA: Information Security, 1.4.1, page 11
How does layered protection apply to information protection?
Apply multiple levels of protection to information assets,
Ensure that layers of protection complement each other,
Build a coordinated strategy that integrates families of protective measures (e.g. technical, physical, access control).
Source: POA: Information Security, 1.4.2, page 13
Access to internal information should be restricted to which groups?
Company personnel and those who have signed a nondisclosure agreement.
Source: POA: Information Security, 1.4.1, page 12
How should obsolete prototypes, models, and test items be disposed of?
They should be destroyed so they can’t be reverse engineered.
Source: POA: Information Security, 1.4.2, page 14
What is a patent?
A patent is a property right granted to an inventor to exclude others from making, using, offering for sale, or selling the invention for a limited time.
Source: POA: Information Security, 1.5, page 21
What is a trademark?
Legal protection for words, names, symbols, devices, or images applied to products or used in connection with goods or services to identify their source.
Source: POA: Information Security, 1.5, page 21
What is a copyright?
Legal protection of the expression of ideas in literary, artistic, and musical works.
Source: POA: Information Security, 1.5, page 21
What is the best way to start addressing infringements of patents, copyrights, and trademarks?
By registering those rights.
Source: POA: Information Security, 1.5, page 21
How long is U.S. patent protection?
20 years from filing.
Source: POA: Information Security, 1.5.3, page 23
What qualifies something as a trade secret?
The information added value or benefit to the owner,
The trade secret was specifically identified, and
The owner provided a reasonable level of protection for the information.
Source: POA: Information Security, 1.5.4, page 24
What is an intrusion detection system?
An intrusion detection system monitors for malicious programs and unauthorized changes to files and settings. It also monitors network traffic and provides alarms for network-based attacks.
Source: POA: Information Security, 1.6.2, page 27
What are three methods of sanitizing electronic media?
Overwriting,
Degaussing,
Physical destruction.
Source: POA: Information Security, 1.6.2, page 27
What are the two primary aspects of recovery after an information loss?
Return to normal business operations as soon as possible,
Implement measures to prevent a recurrence.
Source: POA: Information Security, 1.7, page 30
During which stage of a project is critical information most vulnerable?
The intermediate phases.
Source: POA: Information Security, 1, Appendix D, page 49
When is it appropriate to recycle papers that contain proprietary information?
When the papers have been properly destroyed.
Source: POA: Information Security, 1, Appendix E, page 55
What access control protocol passes credentials between the reader and the control panel in plain text?
Wiegand.
Source: POA: Information Security, 2.5, page 75