Security Management...Garima's Deck Flashcards
Which actions are most successful in preventing theft?
- Identifying risks, ranking and addressing risks.
- Backing up technology with governance, expertise and monitoring
- Taking notice.
How to develop a detailed response strategy (after insider theft)?
- Convening a quick response team
- Creating a cross divisional team to establish the facts of the case.
- Investigate why the theft occurred.
- Conducting a root cause analysis
- Developing a remediation process.
What are the 10 steps of a comprehensive theft and fraud prevention?
- Prevention Program
- Incident
- Incident reporting
- Investigation
- Action
- Resolution
- Analysis
- Publication
- Implementation of controls
- Testing for compliance and training.
What are the components of preventive education?
- Screening for past trust violation
- Policies detailing prohibited activities and actions to be taken in case of violation
- Setting up shipping, receiving and warehousing
- Specific accountability systems for each vulnerable function
- Periodic employee communication to demonstrate company vulnerabilities and management actions.
- Theft and fraud prevention training
- Avenues for employees to report concerns
- Audits & security reviews of high value inventory and operations.
Which is the most common and serious motive for employee theft?
gambling addiction
ABC Inc decided to reduce the risk of theft by spreading valuable assets to various locations, while applying target hardening strategies and counter measures. However, a risk of theft remains. This is referred to as
Residual Risk (not risk spreading, risk threat, or risk impact)
What was the Counterintelligence Strategic Partnership Program earlier known as?
Developing Espionage and Counterintelligence Awareness (DECA) program and then
Awareness of National Security Issues and Response (ANSIR)
An information protection strategy is designed to support what?
An organization’s goals, strategy and timelines.
What are the three types of Information Asset Protection (IAP) threats?
- Intentional threats
- Natural threats
- Inadvertent threats
What are other noteworthy IAP threats besides intentional, natural and inadvertent threats?
- Data mining
- Insiders
- Counterfeiting and piracy
Fill in the blanks:
Risk assessments should identify risks, quantify them, and prioritize them according to an organization’s _________
criteria for risk acceptance.
What are the top business impacts to watch out for while conducting risk assessments (for IAP)?
- Loss of company reputation/image/goodwill;
- Loss of competitive advantage in one product/service;
- Reduced projected/anticipated returns or profitability;
- Loss of core business technology or process; and
- Loss of competitive advantage in multiple products/services
What are the benefits of IAP for businesses?
- Enhances fiduciary oversight, control, and stewardship of key assets
- Aligns information assets with business operations and the organization’s strategic vision;
- Offers efficient allocation of traditional and IT security resources;
- Allows timely pursuit of information asset compromises and intellectual property rights (IPR) violations;
- Helps to negotiate coverage and premiums for intellectual property (IP) and information technology IT insurance;
- Provides consistency in regulatory reporting of assets;
- Standardizes internal and external asset handling
- Identifies key internal and external sources of assets and intellectual capital.
What are the steps for developing an IAP policy?
- Leadership to provide resources and ask all business units to develop strategies to align business and protection goals.
- A dedicated team should be tasked with policy management and auditing
- All should adhere to the policy
- There should be IAP training
- IAP training should be documented.
What must IAP protection measures ensure?
confidentiality, integrity, availability, accountability, recoverability, auditability, and non- repudiation of information in both the physical and cyber environment
Many businesses divide information into three categories. Which three categories are there?
- External release (unrestricted access),
- Internal (limited to employees and contractors), and 3. Confidential (limited by a specific need to know).
True or False:
Layered Protection (Defense in Depth) applies to both physical security and IAP
True
In IAP, what does defense in depth imply?
- Increasing level of trust for those who are given access to successive layers
- Different security technologies or measures that operate in concert.
- Successive layers employed to delay, detect and deter intruders.
What should a security professional do to implement layered technology?
- Apply multiple levels to critical assets
- Ensure successive layers compliment each other
- Built a coordinated strategy that integrates different protective measures.
What are the protective steps recommended to manage documents and records?
1.Place shredders or secure collection receptacles near printers, copiers, and fax machines.
2.Place signs in such areas to remind employees that overruns and misprints must be destroyed.
3.Where appropriate, document any transfers (internal and external) of sensitive records or documents.
4.Carefully select any contractors that destroy records, documents, or sensitive information.
5.Destroy records and sensitive information in a manner that precludes reconstruction consistent with its level of sensitivity, and document the date and place of destruction.
6.Destroy obsolete records regularly, according to a record retention schedule.
7.Destroy incidental and duplicate records on a regular basis.
8.Store media awaiting destruction in secure containers.
9.If possible, avoid discarding destroyed media in trash receptacles accessible to the public.
10.Give categories of access to the documentation, such as public use or restricted use.
11.When records and information are being transported, protect them with locked containers, seals, escorts, radio frequency identification tags, transportation logs, and other means.
What should be done to maintain IAP privacy protection?
- Evaluate privacy information
- Ensure systems are in place to safeguard such information.
- Establish specific privacy policies and designate someone for implementation and management.
- Device a mechanism to investigate priacy breaches
- Review applicable regulatory laws and guidelines and ensure compliance.
- Be transparent about privacy information, accessibility to individuals, notifications and associated actions
- Conduct program audits to ensure proper implementation of privacy policies
What steps can be taken to harmonize IAP and business principles?
- Coordinate IAP matters with all business units.
- Incorporate IAP into business continuity plan
- Employee onboarding, training and professional development programs should include IAP related material
- Communicate IAP issues to all levels of management.
What steps should be taken in OPSEC or information risk management?
- Develop tailored IAP policies for key projects.
- Ensure that peripheral information, facility enhancements and other observable activities, do not provide valuable intelligence to others
- Consider the vulnerability of information released to outside but related entities as these may not have sufficient IAP measures.
- Review the company’s and it partner’s publicly available information to determine if it reveals sensitive information.
- Assess vulnerabilities by taking the adversary’s perspective.
- Implement an approval process for any presentations, papers, or articles that may contain information pertinent to sensitive activities or plans.
How can IAP professionals prevent and detect counterfeiting and illegal copying?
- Monitor the Internet for counterfeit products.
- Train employees to watch for counterfeit products
- Require all to sign nondisclosure agreements (NDAs).
- Employ anti-counterfeiting technology.
- Number all technical memoranda and reports.
- Conduct compliance and inventory control audits
- Work with law enforcement and prosecutorial agencies
How can organization protect its trade secrets?
- Document the identification and valuation of the trade secrets, their role in establishing competitive advantage in the industry, and the full scope of protection measures instituted to protect them.
- Ensure that measures are in place to prevent unauthorized access.
- Conduct periodic, random audits
- Execute nondisclosure agreements
- Establish need-to-know criteria to ensure that individuals have limited access
- Institute effective information warning notifications
- Properly discard what is no longer needed.
How is decision making helpful?
Decision making serves to:
1. Guard against errors in judgement
2. Ask important questions
3. Access information
4. Recognize & assess assumptions, implications and consequences.
5. Come to well reasoned conclusions
6. Achieve commitment & understanding
7. Solve the problem in question.