Information Security (9%) Flashcards
Protecting Information
Information Categories
Sensitive and proprietary information
Privacy-protected data
Intellectual property
Intangible assets
Information defined under international, federal, and state laws governing trade secrets, patents, and copyrights
Protecting Information
Basic principles of effective protection
- Classification and labeling
- Handling protocols to specify use, distribution, storage, security expectations, declassification, return, and destruction/disposal methodology
- Training
- Incident reporting and investigation
- Audit/compliance processes and special needs (disaster recovery)
Protecting Information - Information Assets
What is the second most valuable resource after employee?
Corporate Knowledge
Protecting Information - Information Assets
Intangible rights protecting commercially valuable products of intellect?
Intellectual Property Rights (IRR)
Trademark | Copyright | Patent | TradeSecrets | PublicityRights | MoralRights | Rights against unfair competition
Protecting Information - Information Assets
Excludes others from making, using, offering for sale, or selling an invention for 20 years
Patents
Protecting Information - Information Assets
The owner must take reasonable measures to keep the information secret
Must derive independent economic value, actual or potential, from not being generally known and not being readily ascertainable through proper means by the public
Trade Secret
Protecting Information - Information Assets
For information to be considered a trade secret, the owner must be able to prove…
- The information added value or benefit to the owner
- The trade secret was specifically identified
- The owner provided a reasonable level of protection
A robust security program and strict protection measures clearly and consistently defined, communicated, and enforced
Protecting Information - Information Assets
Patents vs. Trade secrets
- An inventor may protect an invention by patenting it or by deeming it a trade secret
- Patents require public disclosure and last only 20 years
- A trade secret is not disclosed and may last indefinitely
- Stealing a trade secret may violate criminal laws but there are no criminal laws regarding patent infringement
Protecting Information - Information Assets
A proprietary right or other valid economic interest in data resulting from private investment
Proprietary Information
Protecting Information - Information Assets
- Protects the expression of ideas in literary, artistic, and musical works
- Under international law, copyrights do not have to be registered to be protected
- An author or copyright holder can formalize ownership through government registration, which may help in any later enforcement actions
Copyright
Protecting Information - Information Assets
Name, phrase or other device used to identify and distinguish the services of a certain provider
Service Mark
Protecting Information - Information Assets
Word, phrase, logo or other graphic symbol used by a manufacturer or seller to distinguish its product from others
Consists of words, names, symbols, devices, or images applied to products or used in connection with goods or services to identify their source
Trade Mark
Protecting Information - Information Assets
It is intellectual property owner’s responsibility to understand and comply with the requirements related to protecting patent, trademark and copyrights in each relevant jurisdiction
Protecting Information - Information Risk Assessment
A thorough and tailored risk assessment is the foundation for the development of an overall IAP strategy
Protecting Information - Information Risk Assessment
The goal of risk management and the security program is…
to optimize risk, never to minimize it
Protecting Information - Information Risk Assessment
In basic risk management, how much one should spend to prevent an information security incident equals the probability of the incident times its cost
Protecting Information - Information Risk Assessment
Too often there is an over-emphasis on dollar values as the only metric in a risk analysis
- May discourage the consideration of non-tangible measures of factors that cannot be easily quantified
- Qualitative risk analysis are sometimes more appropriate and should be considered in lieu of or in addition to quantitative analysis
Protecting Information - OPSEC
What was developed in the military to protect unclassified information that could reveal sensitive plans and operations?
A Protection Approach
Protecting Information - OPSEC
OPSEC calls for…
Viewing the big picture and identifying any protection gaps that remain despite current security measures
Protecting Information - OPSEC
OPSEC responds to the fact that small bits of information taken from several different sources can be combined to reveal sensitive information
Protecting Information - OPSEC
OPSEC or information risk management should be practiced in organizations of all sizes, but it is particularly valuable for smaller businesses that may not have a large security or IAP staff or a great deal of security resources
Protecting Information - OPSEC
A simple and systematic method of employing safeguards to protect critical information; the process includes five cyclical steps
- Identify assets (critical information
- Define the threat (collectors, capabilities, motivations)
- Assess vulnerabilities
- Analyze the risk (impact, priority, existing countermeasures, etc)
- Develop and implement countermeasures
Protecting Information - Information Threats
Categories of Information Threats
Intentional
Natural
Inadvertent
Protecting Information - Information Threats
Top business impacts of information loss…
- Loss of company reputation/image/goodwill
- Loss of competitive advantage in on product/service
- Reduced projected/anticipated returns or profitability
- Loss of core business technology or process
- Loss of competitive advantage in multiple products/services