Test Flash Cards 7
(28 cards)
What are the three threat categories in information asset protection?
Intentional
Natural
Inadvertent
Access to internal information should be restricted to which groups?
Company personnel and those who have signed a nondisclosure agreement
How should obsolete prototypes, models, and test items be disposed of?
They should be destroyed so they can’t be reverse engineered.
What is the best way to start addressing infringements of patents, copyrights, and trademarks?
By registering those rights
What qualifies something as a trade secret?
The information added value or benefit to the owner, the trade secret was specifically identified, and the owner provided a reasonable level of protection for the information
What is proporietary infomation?
Information of value, owned by an entity or entrusted to it, which has not been disclosed publicly.
What are the two primary aspects of recovery after an information loss?
Return to normal business operations as soon as possible, and implement measures to prevent a recurrence.
What is data mining?
Software-driven collection of open-source data and public information
What three aspects of information must be protected?
Confidentiality
Integrity
Availability
What are five business impacts of an information asset loss event?
- Loss of company reputation/image/goodwill
- Loss of competitive advantage in one product/service
- Reduced projected/anticipated returns or profitability
- Loss of core business technology or process
- Loss of competitive advantage in multiple products/services
Informational assets can take what physical forms?
Prototypes and models,
Manufacturing processes, and
equipment
The strategies used to safeguard information assets typically include what three components?
- Security measures
- Legal protections
- Management practices
What are technical surveillance countermeasures (TSCM)?
Services, equipment, and techniques designed to locate, identify, and neutralize technical surveillance activities
What are three key steps to take after an information loss?
- investigation
- Damage assessment
- Recovery and follow-up
What are four levels of information classification?
- Highly restricted
- Restricted
- Internal use
- Unrestricted
What parties should be considered as potential insider threats? Select all that apply
1. Employees
2. Nation states
3. Customers
4. Vendors
- Employees
- Customers
- Vendors
The results of the risk asseessment should help in what processes?
1. designing access control systems
2. Selecting and prioritizing actions for managing risks
3. Insurance options
- Selecting and prioritizing actions for managing risks
Prototypes may exist in what forms? Select all that apply.
1. Paper designs
2. Market test materials
3. Internal memos
4. Software
- Paper designs
- Market test materials
- Software
What are examples of ‘small bits’ of information that may be pieced together to reveal sensitive information? Select all that apply
1. Website articles
2. Employee records
3. Partnership announcement
4. Supply orders
- Website articles
- Partnership announcement
- Supply orders
A process by which an organizational user is identified and granted privileges to levels of network information, systems, or resources, is called which of the following?
1. Application security control
2. Logical network access control
3. Application encryption control
4. Digital signature control
- Logical network access control
Which of the following is the keystone for continual improvement in the organization’s ability to effectively manage the security of its information assets?
1. NIST Framework
2. Generally Accepted Information Systems Security Practices (GAISSP)
3. ISO/IEC 27001: 2005
4. Red Flag Rules
- ISO/IEC 27001: 2005
Phishing
Cyberattacks, data breaches and other forms of intrusions are carried out by internal and external threat actors. Internal actors could be acting maliciously or simply be employees who made an honest mistake or had their credentials compromised through social engineering or phising attacks.
Phishing perpetrators leverage social engineering by posing as a trustworthy organization and using email or malicious websites to solicit personal information.
Ransomeware
Ransomeware, once known as cryptoware, is the process of encrypting a user’s files and then demanding payment to decrypt them. It is a form of cyberattack that has gained widespread awareness following a string of highly visible campaigns. Ransomewarew is often introduced into networks via phishing, trojan attacks, compromised credentials, or software vulnerabilities.
Business Email Compromise Schemes
Along with ransomeware attacks, malicious actors may also engage in business email compromise schemes (BECs), posing as an executive to initiate a wire transfer to an account controlled by criminals.