Inf Sec - Imp Q Flashcards
Information warranting protection must be appropriately
Identified and Marked
The a)__________ of the information typically determines the b)________
a)Originator
b)Classification Level
An employees access should be based on his or her current ________ and need to know, not solely on position
Job function
____________ models and test items should be destroyed so they cannot be reversed engineered
Obsolete prototype
___________ developed in military to protect unclassified information that could reveal sensitive plan
Operations Security (OPSEC)
Privacy protected information is specifically regulated by the _____________
Health Insurance Portability and Accountability Act (HIPAA)
______ property right granted to an inventor to exclude others from making, using or selling the invention for a limited time
Patent
________ words, names, symbols, devices or images applied to products or used to identity their source
Trademark
________ is used to protect the expression of ideas in literary, artistic and musical works
Copyright
The best way to start addressing infringement of patents, copyrights, and trademarks is to
Register those rights
Under _________ law copyrights do not have to be registered to be protected
International Law
When doing business outside the organizations home country, the best weapon is
Prevention
A patent last only
20 years
Patents convey a range of benefits but require the inventor to disclose the
Inventions elements
Sanitizing information systems and media : _____________________ before the medium is reused
Removing data on a storage medium
The key steps to take after information loss
Investigation
Damage Assessment
Recovery &
Follow up
The use of information systems to commit crime (Human challenge : Failure of imagination)
Cybercrime
_____ is a type of malware, data stealing Trojan Horse Program
Zeus
Software applications that run automated taksts
Bots
Customer lists, pricing information, cost structure, strategic plan or proprietary processes
Intellectual property