Theft Of Data And Intellectual Property Flashcards
Employees are often willing to abide by nondisclosure agreements, but they sometimes do not understand that the information they are communicating might be confidential.
A. True
B. False
True
In the process of data minimization, organizations protect against theft of proprietary information by collecting and storing only the amount of information necessary for employees to perform a given task.
A. True
B. False
True
Which of the following is a common avenue through which proprietary company information is compromised?
A. Company website
B. Publications
C. Speeches by executives
D. All of the above
D. All of the above
Which of the following is a common method used by fraudsters to physically infiltrate and spy on organizations?
A. Pose as a contractor
B. Fabricate or steal an employee badge
C. Secure a position as an employee
D. All of the above
D. All of the above
Which of the following is NOT a recommended method for safeguarding an organization’s proprietary information?
A. Classifying data into categories according to value and sensitivity levels
B. Creating an incident response plan after a data breach occurs
C. Constructing a quiet room to prevent eavesdropping
D. Changing locks and reprogramming door access codes regularly
B. Creating an incident response plan after a data breach occurs
Publicly available information that anyone can lawfully obtain by request, purchase, or observation is known as which of the following?
A. Wide-source information
B. Free-source information
C. Confidential-source information
D. Open-source information
D. Open-source information
The primary reason for a company’s management to construct an electronically and acoustically shielded quiet room is to protect data hosted on the company’s computer servers and other sensitive electronic devices.
A. True
B. False
False
Cooper is an intelligence professional for Whetstone Intelligence, a competitive intelligence firm. He is tasked with gathering intelligence about Cryptic Global, the major competitor of Whetstone’s biggest client. To gather the intelligence, Cooper infiltrates Cryptic Global’s office by posing as a member of its cleaning crew and collects information left around employees’ computers and desks. Cooper’s approach is an example of:
A. Scavenging
B. Shoulder surfing
C. Dumpster diving
D. Spoofing
A. Scavenging
Which of the following should be the first step that the task force takes?
A. Determine what information should be protected.
B. Institute an encryption policy.
C. Shred sensitive documents.
D. Develop an employee awareness program.
A. Determine what information should be protected.
When should an employee be made aware of the need to maintain the confidentiality of an organization’s proprietary information, as well as which information is considered confidential?
A. During an exit interview
B. Upon being hired
C. When signing a nondisclosure agreement
D. All of the above
D. All of the above
Which of the following BEST illustrates the concept of human intelligence?
A. A corporate spy creates a deceptive website that tricks employees from a competing company into divulging confidential information.
B. A corporate spy breaks into a competing company’s office and steals sensitive information while employees are attending an off-site event.
C. A corporate spy installs software on the computer of an employee from a competing company to monitor that employee’s communications.
D. A corporate spy poses as a customer of a competing company to elicit information from the competitor’s salespeople.
D. A corporate spy poses as a customer of a competing company to elicit information from the competitor’s salespeople.
Shareholders’ reports, company newsletters, and staff biographies on the company website might give a competitor valuable information about a company’s product secrets.
A. True
B. False
True
Which of the following BEST illustrates the use of technical surveillance for purposes of corporate espionage?
A. A spy creates a deceptive website to trick employees into entering confidential information.
B. A spy hacks into a target computer and monitors an employee’s communications.
C. A spy impersonates a help desk representative to obtain an employee’s network password.
D. A spy uses a phony employee badge to enter an office and take a sensitive document
B. A spy hacks into a target computer and monitors an employee’s communications.
One method that competitive intelligence professionals commonly use to gather data about a competitor involves posing as a job applicant and interviewing with key employees at the competing company. This practice is BEST described as conducting surveillance.
A. True
B. False
False
Which of the following terms describes the use of illegal, covert means to acquire information for commercial purposes?
A. Corporate espionage
B. Competitive intelligence
C. Traditional espionage
D. Technical surveillance
A. Corporate espionage