CPP 2022 Domain 6: Information Security Flashcards
What are the three threat categories in information asset protection?
Intentional,
Natural,
Inadvertent.
Source: POA, Security Management, 5.3, page 69
To assess these types of threats, one must identify potential adversaries and evaluate their capability and intention to target key information assets.
Intentional threats.
Source: POA, Security Management, 5.3.1, page 69
These types of threats can be attributed to inadequate employee training, misunderstandings, lack of attention to detail, lax security enforcement, pressure to produce deliverables, and insufficient staffing.
Inadvertent threats.
Source: POA, Security Management, 5.3.3, page 70
How does layered protection apply to information protection?
Apply multiple levels of protection to information assets,
Ensure that layers of protection complement each other,
Build a coordinated strategy that integrates families of protective measures (e.g. technical, physical, access control).
Source: POA, Security Management, 5.5.2, page 75
Access to internal information should be restricted to which groups?
Company personnel and those who have signed a nondisclosure agreement.
Source: POA, Security Management, 5.5.1, page 74
How should obsolete prototypes, models, and test items be disposed of?
They should be destroyed so they can’t be reverse engineered.
Source: POA, Security Management, 5.5.2, page 76
What is a patent?
Information that has the government grant of a right, privilege, or authority to exclude others from making, using, marketing, selling, offering for sale, or importing an invention for a specified period granted to the inventor if the device or process is novel, useful, and non-obvious.
Source: Information Asset Protection Guideline, 3.11, page 2
What is a trademark?
Legal protection for words, names, symbols, devices, or images applied to products or used in connection with goods or services to identify their source.
Source: Information Asset Protection Guideline, 7.1.4, page 14
What is a copyright?
A property right in an original work of authorship fixed in any tangible medium of expression, giving the holder the exclusive right to reproduce, adapt, distribute, perform, and display the work.
Source: Information Asset Protection Guideline, 3.6, page 2
What is the best way to start addressing infringements of patents, copyrights, and trademarks?
By registering those rights.
Source: POA, Security Management, 5.5.10, page 84
What are four response options when a copyright has been violated?
Hire legal counsel,
Informing the proper authorities,
Conducting investigations, raids, and seizures,
Initiating civil litigation, administrative proceedings, and criminal prosecutions.
Source: POA, Security Management, 5.5.9, page 83
What qualifies something as a trade secret?
The information added value or benefit to the owner,
The trade secret was specifically identified, and
The owner provided a reasonable level of protection for the information.
Source: POA, Security Management, 5.5.12, page 85
What is a non-disclosure agreement?
A legal contract that establishes a relationship between two or more parties outlining confidentiality and the responsibility of protecting information.
Source: Information Asset Protection Guideline, 3.10, page 2
What is proprietary information?
Information of value, owned by an entity or entrusted to it, which has not been disclosed publicly.
Source: Information Asset Protection Guideline, 3.14, page 3
What are the two primary aspects of recovery after an information loss?
Return to normal business operations as soon as possible,
Implement measures to prevent a recurrence.
Source: POA, Security Management, 5.7.2, page 89
What is confidentiality?
The ability to control the authorization to observe, access, share, or disseminate information.
Source: Information Asset Protection Guideline, 3.4, page 2
When is it appropriate to recycle papers that contain proprietary information?
When the papers have been properly destroyed.
Source: POA, Security Management, Appendix 5A, page 92
What is data mining?
Software-driven collection of open-source data and public information.
Source: POA, Security Management, 5.3.4, page 70
What are three ways to solidify confidentiality expectations in employees and business partners?
Confidentiality,
Intellectual property,
Nondisclosure agreements.
Source: POA, Security Management, 5.3.4, page 71
What is counterfeiting?
The manufacturing or distribution of goods under someone else’s name, and without their permission.
Source: POA, Security Management, 5.3.4, page 71
What is piracy?
The act of copying, stealing, reproducing, transmitting, or selling the intellectual property of another without consent.
Source: POA, Security Management, 5.3.4, page 71
What three aspects of information must be protected?
Confidentiality,
Integrity,
Availability.
Source: POA, Security Management, 5.5.1, page 73
What should be included in regularly performed information asset protection risk assessments?
Risk monitoring to address changes in security requirements as well as changes in the nature of the information assets, threats, frequency of threat occurrence, vulnerabilities, and impacts.
Source: POA, Security Management, 5.4, page 71
What are five business impacts of an information asset loss event?
Loss of company reputation/image/goodwill,
Loss of competitive advantage in one product/service,
Reduced projected/anticipated returns or profitability,
Loss of core business technology or process,
Loss of competitive advantage in multiple products/services.
Source: POA, Security Management, 5.4, page 72
To what extent should information asset protection programs be tailored?
The organization’s size, type, strategy, mission, and operating environment.
Source: Information Asset Protection Guideline, 4, page 5