Inf Sec Flashcards
A property right granted to an inventor to exclude others from making, using, offering for sale, or selling the invention for a limited time is called a
Patent
What factors should be considered when using the internet to link organization offices?
Confidentiality, Integrity, and Availability
Which of the following fields involves defences against the interception of data communication from microphones transmitters or wiretaps?
Transmission security
In protecting information assists, an effective protection strategy begins with:
A clear, practical policy that is shared with all relevant parties and enforced with fairness.
What is the key organizational asset?
Information
What are the key steps that can be taken after an information loss?
1 - Investigation
2 - Damage, assessment
3 - Recovery and follow-up
What is application security?
Modern business applications typically consist of custom code, third-party software, and one or more servers. Improper integration of these components can result in a vulnerability that can later be exploited to gain unauthorized access to data.
What an intrusion detection system can monitor
1 - Malicious programs,
2 - Unauthorized changes to files and settings
What is the most effective IT protection?
Most effective IT protection is a layered approach that integrates
1 - Physical measures
2 - Procedural measure
3 - Logical protection measures
What are the elements of technical surveillance countermeasures?
Services
Equipment and
Techniques.
Who should execute an NDA as a condition of employment in the organization?
All employees should execute an NDA as a condition of employment
When information can be said trade secret?
For information to be trade secret, the owner must be able to prove that,
1 - Information added value or benefit to the owner
2 - The trade secret was significantly identified
3 - The owner provided a reasonable level of protection for the trade secret
What is the fundamental difference between patent and trade secret?
Patent require that the inventor publicly disclose the inventions elements and a patent lasts only 20 years.
Conversely a trade secret is not disclosed and may last indefinitely.
Why it is essential to register the trade marks before the product enters the stream of commerce in any country
Because it is the primary means of ensuring that mark is eligible for before the product enters the stream of commerce protection under that country’s law and ensuring that trademark infringement can be remedied through administrative or judicial proceedings.
What is the best way to start addressing infringement of patents, copyrights and trademarks?
The best way to start addressing infringement of patents, copyrights and trademarks is to register those rights
Which type of facts are respond by operations security?
Operations security responds to the fact that small bits of information taken from several different sources can be combined to reveal sensitive information.
Operations security is used to protect which type of information?
To protect unclassified information.
How an organization can ensure that critical information retains its availability, confidentiality, and integrity during all phases of crisis situations including response and recovery?
By incorporating information asset protection program into the organization’s business continuity plan.
Personnel security plays a key role in information asset protection program. What matters includes in personnel security to protect information assets?
Due diligence investigations of potential partners, standard pre employment screening, and vetting of subcontractors, vendors, and consultants.
Based on what, an employee’s access to information assets should be determined?
An employee’s access should be based on his or her current job function and need to know, not solely on position or management level.
Who typically determines the classification level of information asset?
The originator of the information.
What must be ensured by the protection measures to protect security?
The protection measures (the physical and cyber environment) must be sufficient to ensure confidentiality, integrity, availability, accountability, recoverability, auditability, non- repudiation of information in both the physical and cyber environment
How all the information in the organization need to be evaluated
All information needs to be appropriately evaluated for sensitivity
What should clarify that information is one of the organization’s most important resources?
The policy of the organization