Information Security Flashcards
What are the three threat categories in information asset protection?
Intentional,
Natural,
Inadvertent.
What kinds of companies are particularly vulnerable to counterfeiting and piracy?
Startups,
Early stage firms,
Small and medium size companies that are rich in intangible assets.
According to the FBI, what are the six steps of protecting a business from espionage?
Recognize the (insider or outsider) threat,
Identify and valuate trade secrets,
Implement a proactive plan for protecting trade secrets,
Secure physical and electronics versions of trade secrets,
Confine intellectual knowledge to “need to know”,
Train employees on intellectual property protection.
How does layered protection apply to information protection?
Apply multiple levels of protection to information assets,
Ensure that layers of protection complement each other,
Build a coordinated strategy that integrates families of protective measures (e.g. technical, physical, access control).
Access to internal information should be restricted to which groups?
Company personnel and those who have signed a nondisclosure agreement.
How should obsolete Prototypes, models, and test items be disposed of?
They should be destroyed so they can’t be reversed engineered.
What is a patent?
A patent is a property right granted to an inventor to exclude others from making, using, offering for sale, or selling the invention for a limited time.
What is a trademark?
Legal protection for words, names, symbols, devices, or images applied to products or used in connection with goods or services to identify their source.
What is a copyright?
Legal protection of the expression of ideas in literary, artistic, and musical works.
What is the best way to start addressing infringements of patents, copyrights, and trademarks?
By registering those rights.
How long is US patent protection?
20 years from filing.
What qualifies something as a trade secret?
The information added value or benefit to the owner,
The trade secret was specifically identified,and the owner provided a reasonable level of protection for the information.
What is an intrusion detection system?
And intrusion detection system monitors for malicious programs and unauthorized changes to files and settings. It also monitors network traffic and provides alarms for network based attacks.
What are the three methods of sanitizing electronic media?
Overwriting,
Degaussing,
Physical destruction.
What are the two primary aspects of recovery after an information loss?
Return to normal business operations as soon as possible,
Implement measures to prevent a recurrence.
During which stage of a project is critical information most vulnerable?
The intermediate phase.
When is it appropriate to recycle papers that contain proprietary information?
When the papers have been properly destroyed.
What access control protocol passes credentials between the reader and the control panel in plain text?
Wiegand.