Theft of Data & Intellectual Property 1.700

¡Supera tus tareas y exámenes ahora con Quizwiz!

Competitor Intelligence: how info is lost/ stolen: #11 social engineering: step 1 gather intelligence about the target: discuss 1.721

-

Competitor Intelligence: how info is lost/ stolen: #11 social engineering: step 1 gather intelligence about the target: discuss 1.721

- gather info about target & his environment. the more info, the more chance of success. - possible info: internal processes, jargon, organizational structure, ee's, vulnerabilities, seek info about ee, contractor, vendor, other - gathers info PASSIVELY [without contacting target directly] by focusing on public avail info: ee names, ages, positions, hobbies, interests, addresses, banks, friends, etc.

define Information 1.701

- intellectual property [not tangible assets] -knowledge based assets & capital - intangible proprietary information -business's ideas, designs & innovations

Competitive Intelligence: where do intelligence prof get the info: #9 Online Sources: discuss 1.710

- internet, gov't websites & public record vendors. at little or no cost

Competitive Intelligence: where do intelligence prof get the info: #11 Job Postings: what kind of info can be found? 1.711

- job skills the co needs: can infer target co's success over time, kinds of projects are developing, where it's devoting personnel resources, maybe has signed or expects to sign a large cak., maybe point out defects of key personnel. - what cos pay their ees [maybe valuable for recruiting coveted ees & help ID ees who might be susceptible to recruitment tactics bc of low pay or high rate of ee dissatisfaction [high turnover rate]

Competitor Intelligence: how info is lost/ stolen: #13 Technical Surveillance: list the & various forms used: #3 Video Surveillance: what can be captured/ monitored? 1.733

- cameras can be placed in room w computers to rec pw, un, user manuals, text specifics, error messages, document contents & keyboard overlays - receiving/ shipping docs - track activities on production lines/ presentations in board rooms - execs or key ees engaging in embarrassing activities -track security patrols, special areas like labs, emptying of security wastebaskets, etc

Competitive Intelligence: How info is lost/ stolen: #3 poor info security procedures. how to prevent 1.715

- employ regular update system for protecting & disposing of confidential info - classifying data, limiting logical access, ensuring policies are in place

Competitor Intelligence: how info is lost/ stolen: #11 social engineering: why is this done/ what can be obtained 1.720

- gain unauthorized access to systems - obtain confidential info - to commit fraud, intrude into networks, gain access to buildings, steal other party's secrets, commit id theft, other nefarious acts, get competitive advantage, install malware

Competitive Intelligence: how info is lost /stolen: #9 physical infiltration: a) list warning signs 1.717

- loitering around unescorted around certain areas [file rooms, offices, mail rooms, shipping docs, computer area storage areas, etc]: vendors, janitors, security guards, trash collectors. - service technicians showing up without having been called - ee reports of lost badges, access cards, passwords, etc - sensitive info/ data reported as missing - ee desks/ offices have been tampered w - individuals trying to enter a facility w not proper ID or authorization - individuals attempt to gain access to are by PIGGYBACKING [gaining access to a secured location by exploiting a false assoc w another person who has legitimate access] - reports of trespassing or other criminal activity

who are the targets of corporate espionage? 1.703

- lots of them!! - intellectual property - pricing info & strategies - future plans - r& d ideas - engineering plans & drawings - customer info [ie customer lists or customer billing info] - patents in progress - computer source code - bidding systems & data - business forms - formulas - manufacturing plans & stategies - testing data - trade secrets status - customer survey results - research data - blueprints & diagrams - confidential documents - software - technical records - marketing plans - sales forecasts - executive email & voice mail -personnel records - confidential financial data

corporate espionage: list the common motivations driving corp espionage 1.702-1.703

- sabotoge - revenge - fin gain - bus advantage - knowledge - ideological reasons - challenge or curiosity - ego - entrance into [or status within] a social group

Competitive Intelligence: where do intelligence prof get the info: #10 Data Analysis: what can be gleaned? 1.710

- this is software. -uncovering patters regarding corp filings, corp officers/ directors searches, patent & trademark applications, other. CAN be pieced together to see the potential direction the competitor is headed. [ie id hidden relationships bw key scientists & companies. to use software to cross-check patent authors extracted from patent database. to generate visual displays of relationships bw companies.

Competitive Intelligence: how info is lost/stolen: #1 Accident & Negligence. how to prevent?

- train ees to understand what info is proprietary so mistakes won't be made [ie accident/lack of awareness w friends, social media, delivering a speech] - implement a system of advance review where technical or security staff examine all work before articles published or presented - co should pay attention to info published on websites or other marketing materials. generally anything that does not forward a co's marketing mission should be excluded & removed [ie accidental leaks to the press, execs eager to brag, co's website, ee phone directories, financial info, key ee's biographical data, product features & release dates, details on r&d, job postings]

how is security of information [aka intellectual property] achieved? what's to preserve (3 items) 1.701

-by implementing a process of risk assessment & commensurate controls to ensure the preservation of: a) confidentiality [ensuring t info is accessible only to those authorized & use is for t specified purposes] b) integrity [safeguarding t accuracy & completeness of info & processing methods] c) availability [ensuring authorized users have access to info & assets when required]

Competitive Intelligence: where do intelligence prof get the info: #5 discuss Human Intelligence 1.707

-defined: gather data thru direct contact w peo - from who can provide the most valuable info - the target's company's [ees, competitors, vendors, suppliers, retailers, consultants, retired ees, former ees - others: contact industry experts, industry associations & reporters who cover the industry

Insider Threats to Proprietary Info: 1) list 5 categories of insider threats & explain, d) which is the hardest to ID & defeat? 1.737

1) a) TRAITOR: a legit insider who MISUSES his credentials for malicious acts. SIGNS of a traitor: unusual change in work habits, seeking out sensitive projects, unusual work hours, inconsistent security habits, mocking security policies & procedures, rationalizing inapprop actions, changes in lifestyle & living beyond their means] b) ZEALOT: a trusted insider w strong & uncompromising BELIEFS that clash w their co's perspectives on certain issues & subjects. Pose a threat cause they might exploit their access/ inside knowledge to REFORM the co. [ ie making unauthorized disclosures of info to public/ grant access to outsiders, destroy info & halting services/ products] c) SPY: one who intentionally is placed in a situation/ organization to gather intelligence ie on prod development, product launches, development or changes. Spies are common in foreign, business & competitive intelligence efforts. d) BROWSERS: are insiders who are overtly curious @ info that they do not need access, knowledge of or posses to carry out their duties. They might be looking for info to use for personal gain [obtaining awards, supporting decisions about a promotion, gaining personal advantage over their peers]. e) WELL INTENTIONED INSIDERS: insiders who thru ignorance or laziness, unintentionally foster security breaches. Can do by: disabling anti virus software, installing unapproved software, leaving their workstations/ facilities unlocked, using easy to crack pw & failing to shread/ destroy sensitive info. Might be otherwise steller ees re work production. 2) Browsers are the hardest insider threat to ID & can be even harder to defeat.

Competitive Intelligence: How info is lost/ stolen: list the 13 ways 1.713 - 1.729

1) accident & negligence 2) loss of physical media 3) poor information security procedures 4) improper disposal of documents & media 5) malicious insiders 6) insider spies [aka moles] 7) sleepers 8) computer attacks 9) physical infiltration 10) transactional intelligence 11) social engineering 12) physical surveillance 13) technical surveillance

Competitor Intelligence: how info is lost/ stolen: #13 Technical Surveillance: list the & various forms used 1.730-1.736

1) aerial photography [google earth & private aerial photography firms][ to gather ie info on competitors' construction/ expansion project, measure size of shipments, det # of ees...] 2) bugging & wiretapping devices [the spy has 2 primary considerations: where to insert the surveillance equip & which of the various technologies to employ] 3) video surveillance 4) photographic cameras 5) mobile phones 6) monitoring computer emanations 7) computer system penetrations [ part of organized intelligence campaign or random attack by hacker]

Insider Threats to Proprietary Info: List 3 types of insiders 1.737

1) employees [have rights & access assoc w being employed by the co] 2) associates [who have physical access to co's facilities, but aren't ees ie. contractors & cleaning crew] 3) affiliates [peo connected to pure insiders or insider assoc [ie spouse, friend, client] & can use the insider's credentials to gain access]

Insider Threats to Proprietary Info: what are the 5 emphasized strategies for combatting insider threats by Patrick Reidy, Chief Information Security Officer of FBI in a 2013 brief at Black Hat USA? 1.741

1) focus on deterrence, not detection [create a culture that deters, the bad behavior will stand out from normal bus so resources can be spent focusing on them] 2) know your people [know who are the weak links . use hr data to narrow down threats] 3) ID info most likely to be valuable to someone else & protect it to a greater degree that other info] 4) monitor egress & egress points for info [USB ports, printers, network boundaries]. [egress def: the action of GOING OUT OF or LEAVING A PLACE] 5) baseline normal activities & look for anomolies

can espionage be legal & illegal? 1.702

1) legal, NO. But yes only for gov't purposes. BUT NOT cover legit intelligence collection & analysis using legal means 2) illegal, YES. the main definition of espionage is when done illegally [aka corp espionage]

Competitive Intelligence: where do intelligence prof get the info: #4 surveillance: what 2 types of surveillance? 1.706

1) physical surveillance: is the REAL TIME observation of the target's actions or communications 2) technical surveillance: the practice of covertly acquiring audio, visual or other types of data from targets thru the use of technical devices, procedures & techniques. can be costly [labor intensive, highly intrusion & fraught w potential legal problems]

Program for Safeguarding Proprietary Information: the system should include which 13 items? 1.744-1.756

1) task force 2) security risk assessment 3) security policies & procedures 4) awareness training 5) nondisclosure agreements 6) noncompetition agreements 7) data classification 8) data retention & destruction policies 9) data minimization 10) security controls 11) measures to guard manual file systems 12) monitoring visitors access 13) quiet room

Competitor Intelligence: how info is lost/ stolen: #11 Social Engineering: what are some red flags of IN-PERSON social engineering? 1.726

EMPLOYEES SHOULD LOOK FOR: - a person making an unusual request - a person engaging in meandering conversation & then makes an urgent request - a person making a request: -- that's overly flattering -- refuses to provide contact info [ill call you back in a few min] -- rejects any possibility of a callback -- asserts that the request is urgent -- claims to have the same interest/ background -- uses intimidation to drive the request -- references higher ups to drive the request -- asserts that the request has been approved by mgmt -- states that neg consequences will result if a request is not complied w -- is quick on/ off the phone -- is chatty even though they have never met -- fails to use standard industry jargon or otherwise sounds like an outsider -- sounds unnatural or stilted -- offers to help w an unknown problem -- brags @ his authority within the org -- threatens reprimands if requests are not granted -- overemphasizes details -- volunteers info -- answers questions that were not asked

Competitive Intelligence: is this legal or illegal? Where do Intelligence Professionals get the info? list is numerous 1.704

LEGAL 1) open source info 2) dumpster diving 3) scavenging 4) surveillance 5) human intelligence 6) government sources 7) industry reports & studies 8) periodicals 9) online sources 10) data analysis 11) job postings 12) environmental impact statements 13) commercial filings [ie UCC filings]

Competitive Intelligence: Where do Intelligence Professionals get the info?: #1 open source info: a) list some examples of open source info, b) how do companies use open source info? list the various means 1.705

a) f/s of publicly trades companies, product descriptions & job listings b) - obtaining info about a TARGET - gathering info to plan & carry out an ATTACK - LOCATING targets - finding LEGAL RECORDS about TARGETS - obtaining financial or credit info about targets - obtaining personal info about targets [names, ages, positions, contact info, hobbies, telephone listings, interests, addresses, banks, friends] - ID target's marital status - Uncovering a target's litigation history - locating a target's assets - conducting background research on targets

Program for Safeguarding Proprietary Information: #5 Nondisclosure Agreements a) define, b) t/f should consider making NA mandatory, c) what functions do NA provide? d) what 2 keys times should NA be signed? e) what is one of the primary reasons ees communicate confidential info to outside parties? f) what is one of the least expensive & most efficient method for controlling the loss of proprietary info? 1.750

a) a written agreement requiring the keeping of all trade secrets & proprietary info learned during their employment confidential b) true c) 1) they delineate the confidentiality EXPECTATIONS the er has for ees 2) they demonstrate that the er is SERIOUS about protecting data 3) they show the REASONABLE EFFORTS er take to maintain the secrecy of info d) hire & term e) lack of ee education about NA [don't understand the info they are communicating is confidential] f) nondisclosure agreements

Competitive Intelligence: how data is lost/ stolen: #7 sleepers: a) define, b) diff bw sleeper & mole 1.716

a) has a long range interest in monitoring the co. this ee keeps a low profile & regularly reports to his control about the co's operations. Might be extremely difficult to detect b) sleeper functions like a mole. Difference: sleeper is deliberately planted as an ee. Mole is an existing employee of a co who is somehow compromised & has agreed to turn over this co's secrets

Competitor Intelligence: how info is lost/ stolen: #11 Social Engineering: a) define, b) what's the biggest vulnerability in info security? 1.719

a) the act of using deceptive techniques to manipulate peo into taking certain actions or disclosing info. collect info on the target b) people are the biggest vulnerability & social engineering schemes prey on the vulnerability. NOT exploit technical vulnerabilities, but SOCIAL PSYCHOLOGICAL WEAKNESSES in peo. spies don't need high level of technical knowledge, but do need social skills. use various forms, of trickery, persuasion, threats or cajolery to obtain info

Competitor Intelligence: how info is lost/ stolen: #13 Technical Surveillance: list the & various forms used: #6 Monitoring Computer Emanations: a) define emanation b) give example c) how to prevent monitoring computer emanations? 1.735

a) an abstract bu perceptible thing that issues / originates from a source or a tenuous substance or from of radiation given off by something. * prof can monitor computer emanations which form detectable & decodable patterns b) the Van Eck unit is a detector/ receiver that an reproduce keyboard entries from a considerable distance. the unit consists of a directional antenna, logic circuits, 2 adjustable oscillators. Can detect contents of a CRT [cathode ray tube] / LCD [liquid crystal] display c) shield computer equip & transmission lines using the TEMPEST procedures [used by military & defense contractors. are high cost [so many bus don't use]]

Competitor Intelligence: how info is lost/ stolen: #10 transactional intelligence: a) what info can transactional intelligence garner, b) what type of intelligence is this a hybrid of, c) is transactional intelligence helpful in collecting human intelligence?, d) can a spy be his own source of transactional intelligence? 1.718

a) - a person's vices - details of target's bus travel - hotels stayed, where likely to stay in the future - who target has called - interest & hobbies [a way to edge into target's confidence] - cos/ subjects the target has reserached b) hybrid of documentary source intelligence [combining open sources avail & gray sources] and human intelligence. the corp spy needs to an inside contact to obtain target info & eventually analyze without additional assistance. c) yes, ie if spy know subject's hobbies then might be able to make aconnection/ possibly friendship d) yes

Competitor Intelligence: how info is lost/ stolen: #13 Technical Surveillance: list the & various forms used: #4 Photographic Cameras: list 3 devices 1.733

a) Minicameras: ie maps, schematics, diagrams, engineering drawings. with copy machines, the use of minicameras use has declined b) Infrared cameras: night vision for capturing info in low light, OR examine damaged, burned or erased doc [in the right conditions] c) Digital cameras: ie gather info on: signs, lettering on side of vehicles, configuration of blds & streets, license plates, computer screens. Use telescopic or reflective lenses to avoid detection [to be far away]. * analyze at a later date & cataloguee: - subject matter - date/ time of day - direction of the shot - number of sequence in the shot - important features in the shot Can easily be incorporated into a word doc, etc data base [ i2] which includes narrative reports, charts, diagrams & chronologies]

Competitor Intelligence: how info is lost/ stolen: #11 Social Engineering: a) easy to defend? b) how to prevent social engineering schemes? 1.727

a) NO, are HARD to defend against cause are attacks against human nature b) - have clear security policies & procedures - conduct security awareness training - educate ees @ how social engineering attacks are tied to psychology & human nature -train ees to ID social engineering attacks & be aware of how social engineering works, the data that will be sought after & types of info that ees are allowed to disseminate - educate ees so they understand the VALUE of info that social engineers seek - educate ees why security protocols are essential - train ees on an ongoing basis to stay fresh - train ees to foucs on the nature of request [NOT the context which requests are made] - train help desk ees to ask specific identifying questions BEFORE giving out any info over the phone & give ees a list of min ID requirements - tailor ee training to the audience - promote ee compliance w security policies - make ees aware of social engineering threats & educate them about actual instances of S.E. attacks, circulate prevention tips - prohibit ees from giving out pw or persona id info - inform ees that should not keep confidential info & computers unattended - keep references to key admin, technical & billing contacts for the organ's internet domain as anonymous as possible - verify all emails for authenticity - shred all trash containing confidential info before disposing - encrypt all sensitive data - test ee's security readiness - train ees to document suspicious events - undertake social engineering audits - issue security alerts when suspecious activity occurs - train ees on how to mitigate problems that occur - conduct penetration test that use S.E.

Insider Threats to Proprietary Info: a) this is a small issue? b) define insiders, c) list 2 critical links that put ees in position to exploit co's info security vulnerabilities, d) when is this especially a concern? 1.737

a) NO, this is one of the largest threats to a co's info resources b) are indiv w access or inside knowledge about the co [access or knowledge] c) TRUST of their ees & ACCESS to facilities d) when ees leave the co for another [taking the info w them]

Minimizing the Risks of Misappropriation Claims: a) define, b) give example c) how to prevent? 1.756

a) PREVENT EES from appropriating info belonging to others b) new hire from competitor might expose co to liability. be careful, co might not even be aware is getting confidential info c) during hiring: carefully screen potential ees, determine if has secretive knowledge & learn about restrictions, HR to ask potential ee about any agreements, noncompete, consult legal counsel, conduct new hire training.

Competitive Intelligence: how info is lost/ stolen: #11 social engineering: step #2 select the tactic: what are the 5 possible tactics? 1.721

a) Pretexting: defined: the act of impersonating someone or making false or misleading statements to persuade a target to release info/ perform some action. Can occur on the phone, in person. for example: pose as person of authority, member of tech support having legit access to network, one who needs help, gov't ee, etc. b) Shoulder Surfing: defined: observing one from nearby while target enters un & pw, talks on phone, fills out fin forms, etc. to gather valuable info c) Spam & Chain emails: use to carryout their attacks. Can design to look like from popular, trusted sites. Can include infected attachments, links to malicious sites. Can be designed to be personalized. d) Phishing: involves tricking bus/ indiv into PROVIDING pw, account numbers, other data by FALSELY CLAIMING to be from an actual bank, bus, ISP, etc that target does bus with. Usually via email or other electronic communication.

Competitive Intelligence: what are the 6 co departments that are favorite employee targets of Intelligence Prof? 1.712

a) R&D [ can glean info from trade shows & conferences, ee's publications, hire academics for research or study. MUST keep results confidential [don't forget about grad students & TAs]] b) marketing [can glean info on product release dates, advertising plans & testing results] c) manufacturing & production d) HR [job postings, announcements re open positions. spies try to obtain interview to learn about add'l info & what the job will entail] e) sales [might glean product related details, marketing strategies & pricing] f) purchasing [might reveal which products sell the best, info regarding suppliers, supplies & service costs]

Program for Safeguarding Proprietary Information: a) t/f such controls should depend on combo & coordination of peo, processes, technology & other resources, b) t/f the info security system should be developed by either corp info officer CIO or security mgmt consultant 1.744

a) TRUE b) false. both

competitive intelligence: a) is this a legit business function? b) why done? 1.702

a) YES. in conjunction w marketing, r&d, general bus strategy & "knowledge management' b) helps bus to anticipate competitors' r&d strategies & det their operating costs, pricing policies, fin strength & capacity. helps bus succeed & take the lead in their marketplace

Program for Safeguarding Proprietary Information: #3 Security Policies & Procedures: a) what does a security policy do? b) what 3 things should the policy do? c) discuss guiding principles, d) t/f: to be effective, must: be implemented & communicated to all ees in effective manner OR easy to understand, e) what should provide guidance on? f) what should the policy state if writing? 1.746

a) a document that outlines specific requirements / rules designed to provide information security. b) 1) contain ee RESPONSIBILITIES 2) require COMPLIANCE 3) define CONSEQUENCES for compliance failures c) should reflect managements' commitment for security, thus should contain guiding principles to convey mgmt's 'over-arching' beliefs on info security d) F, should be both e) the proper use of info assets, which allows mgt to mitigate risks [assoc w inapprop use of computer systems, software, email & the internet] f) what policies & standards must be followed by ees, vendors & bus partners w regard to: network & communication security. Outline: WHAT must be done, WHO must do it & CONSEQUENCES of not complying. AND ee must sign an agreement

Competitive Intelligence: where do intelligence prof get the info: #6 Government sources. a) discuss b) list some sources 1.708

a) a lot of info is collected by the gov't & avail. can obtain valuable info on the target & provide info about the lifestyle of a person b) National Securities Associations: 1) if co trades stock on stock exchange: ie type of bus, history, organ structure, auditor, bs & p&l. 2) publicly traded co: SEC, EDGAR [electronic data gathering, analysis & retrieval] {ie 10k, p&l , bs, debt structure, foreign ownership, properties owned, subsidiaries, industry description, depreciation, dilution & other } 3) business filings: Jurisdictions [state, local , county] financial & organizational filings. May REVEAL: real property, vehicles, equp, intellectual property registered in co's name. ie filing articles of incorporation w secretary of state {May REVEAL name of officers & directors, officer's bus interests, bus connections]

Program for Safeguarding Proprietary Information: #5 Noncompetition Agreements: a) define b) what are some legal issues that may arise? c) when is it advisable to consult legal counsel? d) once signed, what should co do? 1.751

a) an agreement whereby an ee agrees not to work for a competing co within a certain time period after leaving current er b) some jurisdictions have held that such agreements are against public policy [limit the person's future employment, therefore unenforceable], or will do so only if have valid employment agreement & signed at the same time, or if AT-WILL ee who's not covered by employment agreement then it's unenforceable c) before instituting a noncompensation agreement [make sure it's valid & enforceable under applicable laws] d) remind it's ees about the agreement provisions during exit interviews. maybe have them sign a statement they acknowledge & understand it & will abide by it.

Program for Safeguarding Proprietary Information: # 13 Quite Room: a) define 1.755

a) an area that's acoustically & radio-frequency shielded so NO listening or recording of conversations/ communications.

Competitive Intelligence: where do intelligence prof get the info: #12 Environmental Impact Statements . a) function, b) what do they contain 1.711

a) are required for certain actions that significantly affect the quality of human environment b) large amounts of historical, financial & operational info {supply background info & explain it's actions in detail. info on: emissions, hazardous mat'ls used, possible accidents..} Might provide picture of size & operational capacity of a plant/co and to ID the date the project will commence.

Competitive Intelligence: how info is lost/stolen: # 10 Transactional Intelligence: a) how to gather, b) where can develop paid informants 1.718

a) by observing about any mundane bus transaction [ie frequent flyer miles doc, credit card receipts.. to gather info for profile on target, develop a network of paid informants] b) travel agents, airline reservationists, major credit card cos, staff at internet providers, ees at video, music, other entertainment providers, phone co ees w access to phone records & ee of commercial database providers ie dialog & d&b who access to transactional records

Competitive Intelligence: Where do Intelligence Professionals get the info?: a) Discuss #2 dumpster diving b) #3 discuss scavenging, c) #4 surveillance 1.706

a) can obtain sensitive info by looking into the trash. b) collecting info left around computer systems [on desks, workstations]. might reveal usernames, passwords, sensitive doc & media drivers c) the planned observation of peo, place or objects to obtain info about targets

Program for Safeguarding Proprietary Information: # 11 Measures to Guard Manual File Systems: a) give examples of such info, b) what measures can be put in place? c) what are trapped names? 1.754

a) contact lists, schedules, calendars. ie trash cans b) * use high grade locking filing cabinets & lock up when not in use * use cross shredder or have a bonded waste disposal co pick up * receive & send mail from a secure site [mail drops, po boxes, locked mail boxes] & keys to remain secure * provide reasonable perimeter security by using an alarm system & securing locks on doors & windows * pay attention to such auxiliary materials, such as: calendars, internal phone directories, notebooks & exp logs form sensitive cases, wip on sensitive cases, mailing lists * becareful of dry erase boards or other meeting room displays might contain sensitive info * paper writing tablets may have impressions from notes on sensitive info * computer printouts of sensitive info * large offices should consider loggin in & out of sensitive info from a secure area c) a fictitious name w an address that the co controls. if mail is ever delivered to a trapped name, it will be apparent that the list has been compromised. and might indicate who bot the list & help determine where the security breach occurred.

Program for Safeguarding Proprietary Information: #7 Data Classification: a) CERT: what is this policy? b) why assign classifications? c) what 2 steps are involved? 1.751

a) cos should implement a data classification polity that establishes what protections must be afforded to data of diff value & sensitivity levels. b) to follow a structured approach for establishing approp controls for diff data categories and help ee awareness c) organizing the co's data into diff security levels based on value & sensitivity AND assigning ea level of classification differing rules for viewing, editing & sharing the data

Competitive Intelligence: how info is lost/ stolen: physical infiltration: a) define b) common techniques 1.717

a) defined: where an individual enters a target organization to spy on ees. Often when: night time schedule, lack of avail recruits, expense constraints, or when the spy has specialized knowledge that makes him the best spy for the job. ie advanced technical knowledge b) techniques: 1) secure a position or pose as an ee or contract laborer. ie security officer or janitor. 2) steal or fabricate ee badges for access to the co

Investigating Corporate Espionage: a) what should first do upon knowing their are a victim of corp espionage? b) IF suspect info has been misappropriated, what actions should be taken? c) how to det how the sensitive info was compromised? 1.742

a) det how the info was compromised [know who theft occurred often reveals who stole the info] b) involve legal counsel, consider engaging outside consultants to investigate, secure all confidential info [install physical barriers, limit users access, change locks & other controls], consider reporting to gov't agency, *most important: id ees w access to confidential info & interview them about their knowledge of the relevant facts*, interview nonsuspect ees who are responsible for protecting the confidential info & interview any 3rd parties c) determine if was result of negligence, accident, or procedural matter [inadequate security controls]

Insider Threats to Proprietary Info: list other measures to combat 1.741

a) educate ees what's proprietary & confidential b) require all ees & 3rd party vendors/ contractors to sign nondisclosure agreements. c) perform background checks on all vendors/ contractors & ees who access to data d) prohibit all from printing documents not required for their bus e) if possible, avoid connecting info systems w trusted bus partners f) upon term, conduct exit interviews [should be advised about co's trade secrets, etc, should NOT disclose/ use the info. Have them sign a form about this. AND deactivate all insider's access to co's tools & resources

Electronic Countersurveillance: a) what to do if mgt suspects a bugging/ electronic surveillance? b) what's it designed to do? c) what 2 goals to achieve? d) what qualifications should mgt look for? e) best practices on sweeps 1.736

a) hiring an expert to conduct a technical surveillance countermeasures {TSC} SURVEY. called 'Debugging'. b) detect, ID, locate electronic eavesdropping devices, security hazards, or security weaknesses in a specific area. c) 1) to detect the presence & location of tech surveillance equip & 2) ID existing potential security weaknesses d) - competent in electronics - have extensive knowledge in design, engineering, & maintenance - trained in eavesdropping technique - practiced in RF {radio frequency} allocation & propagation - knowledgeable in all techniques of modulation, electrical wiring & installation principals e) practice secrecy within the co about the sweeps, limit # of peo who are notified of them [cause mole might exist], maybe create a cover story to explain the presence in the bldg, schedule after hours, accompany the TSCM experts at all times during the sweep

Competitive Intelligence: Where do Intelligence Professionals get the info?: Discuss #1 open source info 1.704

a) info found in the public domain b) #301 of the US National Open Source Enterprise's Intelligence Community Directive No 301- can be defined as publicly available data 'that anyone can lawfully obtain by request, purchase or observation c) can include: 1) mass communication 2) computer based info 3) public info that the gov't maintains & makes accessible to the public 4) info derived from prof & academic sources 5) commercial data 6) info produced by the private sector, gov't & academia

Competitive Intelligence: where do intelligence prof get the info: #8 Periodicals a) what can be gleaned? b) give some examples

a) info on business [background on indiv/bus] b) - trade resources [associations & industry publications, studies, surveys, newsletters, directories] - publications by academic institutions - speaker presentations & speeches - conference presentations - security analysts' reports - local papers & magazines [run profiles, provide searchable online databases] - commercial database vendors [newspapers & periodicals] - libraries

Competitor Intelligence: how info is lost/ stolen: #11 Social Engineering: 4 phases: #4 Exploit the target's trust to elicit info: a) define elicitation, b) how done? 1.724

a) is the process of extracting info from something/ someone b) done by using conversational skills & other tactics to encourage targets to release info. Typically extract info SUBTLETY to seem normal & innocent conversations. this is low risk & hard to detect. b)

Investigating Corporate Espionage: a) IF determine theft was not by negligence or accident, then do what? b) give example of co's marketing list was stolen. how to investigate c) if investigators fail to develop any leads w ees, vendors, or visitors, what to do next? D) if no info by deception, what's next? 1.743

a) look for evidence of insider theft. Begin looking at peo closest to the info & work outward. b) start w ees who manage the list. perform background investigations on these ees, look for red flags of corp spies [unusual recent financial or lifestyle changes, unusual work hours]. THEN investigate outward to other ees, vendors, customers, visitors, etc. c) look for signs of external attack using DECEPTION: interview ees in affected area to det if they observed any suspicious activties or rec'd suspicious call/ emails at or near time of the loss. Anyone get approached for info? d) look for evidence of PHYSICAL PENETRATION. Review surveillance video or traffic in/ out of affected area, ask ees if they remember anything/ one suspicious. check records of incidents of criminal activities on site or near at time of loss. review security reports for suspicious activity [ie peo trying to get in the trash or loitering in parking lot]. THEN look at electronic surveillance.

Competitive Intelligence: where do intelligence prof get the info: #4 surveillance: name the 2 types of physical surveillance 1.706

a) mobile surveillance: observing & FOLLOWING persons. the prof must be flexible & imaginative [ie place a distinctive reflective tape on back of car for night following. place a GPS tracker [if legally permissible]. blend in at a bar... b) fixed surveillance: where secretly observes an area or person from a distance. key disadvantage: the base might be spotted by the target/ other peo passing by. SO must camouflage, be familiar w their surroundings, not draw attention.

Competitive Intelligence: how data is lost/ stolen: #6 insider spies [moles]: a) define, b) what techniques used to recruite. c) how to prevent 1.715

a) mole defined: an ee recruited to spy against his er. agrees to betray his er's trust by handing over confidential info that belongs to the co. b) recruitment techniques: bribe the spy, extort [blackmail] the target, use romantic/ sexual seductions, exploit target's strong social/ political feelings, convince target that spying is moral/ justified [target peo who feel like victims, are bitter, who feel resentful, under paid or unrecognized], trap a target so he's forced to spy on his er c) mgt to train key ees to report any suspected recruitment effort ASAP. Mgt must train ees to be WARY OF PEO WHO: encourage & finance an ee's vice, express great deal of sympathy for cause important to an ee, offer to help ee w a serious financial problem, attempt to seduce an ee, attempt to blackmail an ee

Program for Safeguarding Proprietary Information: # 12 Monitoring of Visitor Access: a) what to do? 1.755

a) monitor and limit visitor access b) visitors s/be required to sign in & out on a log book c) issue a visitor badge that id's them as a non ee d) be escorted at all times e) not be allowed into confidential areas f) monitor maintenance workers g) locks be changed or reprogrammed. espically if ee term or quit

Competitive Intelligence: Where do Intelligence Professionals get the info?: #1 open source info: a) means free? b) how does open source info differ from nonpublic info 1.705

a) not necessarily mean free ie S&P b) the dividing line is RIGHT TO ACCESS the info. Open source is avail to anyone who wants to collect it without legal consequences. NONPublic is NOT open to the public. Access is restricted. VIOLATES THE LAW if access nonpublic records

Competitor Intelligence: how info is lost/ stolen: #11 Social Engineering: 4 phases: #4 exploit the target's trust to elicit info: a) what elicitation skills are needed? b) what are common elicitation tactics 1.725

a) not require high level of tech expertise. more social skills and other. - communication skills - adaptability (adapt comm to fit the environment & situation) - relationship & bonding skills - interrogation skills [to ask questions to generate a response] - influence skills - manipulation skills - lack of fear when talking to peo in abnormal situations - care for other peo - a nonjudgmental ear b) - appealing to the target's ego [to make target more self-assured which tends to remove logical awareness that a breach might be occurring] - expressing mutual interest [to help extend the conversation beyond the initial conversation] - making deliberate false statements [to elicit response for corrections] - volunteering information [which may trigger the target's response w equal useful info] - assuming knowledge [exploits the common assumption that if peo have knowledge about a subject , it's acceptable to discuss the topic w them.] - exploiting the desire to be helpful - exploiting the feelings of fear [feeling fearful affects the logical function of judgement. ex impersonating a person of authority..] -encouraging action based on a chance of some benefit - exploiting actions based on a moral duty [or outrage, to mitigate some wronging] -exploiting desires to avoid guilt [manipulate empathy or create sympathy] -making unreasonable requests [which know will be rejected by the target, then make a more reasonable follow up request. appeal to compromise] -asking well informed questions

Competitor Intelligence: how info is lost/ stolen: #13 Technical Surveillance: list the & various forms used: #5 Mobile phones: a) diff bw analogue phones vs digital phones, b) list a modern common mobile phone platforms 1.735

a) old mobile phone networks are analogue [maybe used today in rural areas] : easier to monitor than newer modern digital technology b) GSM [Global System for Mobile Communications] transmits comm that are fully digital & highly encrypted [but still can be penetrated]. Gov't and others still could be listening. EEs should NOT discuss sensitive info on the phone

Competitive Intelligence: where do intelligence prof get the info: #5 Human Intelligence: a) other approaches? 1.708

a) posing as a customer of the targe. 2 weaknesses in the corp culture: x) all sales peo want to make a sale y) many sales peo will almost do anything to make a sale b) employment interviews [real & fake] c) false licensing negotiations d) false acquisition or merger negotiations e) hiring an ee away from a target co f) planting an agent in a target co g) social engineering

Insider Threats to Proprietary Info: a) Who is CERT? b) list the top 10 lists for winning the battle against insider threats 1.740

a) pronounced 'suhurt'. is the internet's official emergency team. stands for Computer Emergency Readiness Team. was formed by the Defense Advanced Research Projects Agency [DARPA] in nov 1988 after the internet was assaulted by the worm incident. Today CERT focuses on providing alerts & incident handling & avoidance guidelines. b) 1) create an insider threat program [form team, create policies, develop processes, implement controls & regularly communicate to ees] 2) work together across the organization [mgmt, it, data owners, software engineers, general counsel & hr] 3) address ee privacy issues w general counsel [ees have certain rights & differing laws] 4) pay close attention at resignation/ termination 5) educate ees re potential recruitment 6) recognize concerning behavior as a potential indicator : train ees to recognize who are at risk of committing a breach [red flags: living beyond their means, experiencing fin difficulties, having uncommonly close relationship w vendors/ customers, demonstrating excessive control over their job responsibilities] 7) mitigate threats from trusted bus partners [ie contractors & outsourced organizations] 8) use current technologies differently [most organ have implemented technologies to detect network intrusions & other threats, BUT should also use them to detect insider threats.] 9) focus on protecting the most valuable assets [ID & protect the most valuable assets of the co] 10) learn from past incidents [past incidents of threats & abuse may suggest vulnerabilities for future exploitation.]

Competitive Intelligence: where do intelligence prof get the info: #7 Industry Reports & Studies a) what does this provide? b) what are the basic resources? 1.709

a) provides summaries of primary & secondary market research within various industries. provides statistical benchmarks that can show where a co stands in its industry & help est a target's co's financial status & help delineate the standards for evaluating successful cos in specific industries. b) gov't sources, commercial data bases & directories.

Competitive Intelligence: where do intelligence prof get the info: #13 Commercial Filings: a) what are these? B) what info can be obtained? c) what depends on the availability of info? d) in US which entity governs commercial filings?function? 1.712

a) records that banks, finance companies & other lenders generate when co borrows or leases who use property as COLLATERAL for loans b) info about co's bus transactions. help ID pp co has financed & provide operational details describing equip & mat'ls that have been purchased or pledged for the loan c) depends on the jurisdiction is COMMON LAW or CIVIL LAW country. Most countries w publicly searchable commercial filings have aCOMMON LAW systems d) the UCC [universal commercial code]. the UCC filings are maintained & searchable at the STATE level by each SECRETARY of state. The UCC filings are public records that documents loans & leases obtained w secured assets.

Program for Safeguarding Proprietary Information: #4 Awareness Training: what should co do/focus on w their ees? 1.748

a) require all to complete awareness training b) that all understand the importance of this c) include all: satellite offices, temp help, seasonal workers, contractors & vendors d) educate all on what's considered to be proprietary e) the dangers of electronic communications & how to protect info f) foreign travelers: make them aware of how much foreign gov'ts operate huge & sophisticated intelligence gathering ops & takes these steps [software are patched & up to date, pw or passcode protect all devices, min data contained in devices & avoid using public computers or connecting to unsecure wi-fi] g) train ees to id red flags & how to deal w high risk issues likely to encounter h) provide regularly remnders about the importance i) training presented in manner approp to the audience

Program for Safeguarding Proprietary Information: #4 Awareness Training: what points should security training cover? 1.749

a) the co's info security policies & procedures and REASONS behind them b) the DANGERS of data breaches c) real world EXAMPLES of how data has been compromised & prevention of them d) SOCIAL engineering awareness e) TECHNIQUES HACKERS use to access data f) how to avoid PHISHING attacks g) approp measures for HANDLING & PROTECTING data h) techniques for SAFEGUARDING PORTABLE data i) PASSWORD construction & management j) tips for a WEB BROWSING k) approp use of SOCIAL networking sites l) guidance on data ENCRYPTION m) document & data CONTROL n) how to recognize security THREATS o) procedures for reporting SUSPECTED breaches p) ways to ID & AVOID situations that could lead to data breaches q) guidance on applicable LAWS r) DISCIPLINARY measures for violating security policies

Program for Safeguarding Proprietary Information: #9 Data Minimization: a) define, b) why is this important to data security? c) why is it important for personal data? d) what's the purpose OECD guidelines on the Protection & Transborder Flows of Personal Data? e) Purpose of EU Directive on Personal Data Protection & then the new directive to take place 5/25/2018? less strict? 1.753

a) the collecting & storing of minimal amount of info necessary to perform a given task. b) cause thieves can't steal what the co does not have c) cause individual expectations & privacy laws & regulations to maintain data security d) function: sets of principles for protecting personal info. contains a collection limitation principle "there s/be limits to the collection of personal data & such data s/be obtained by lawful & fair means &, where approp, with the knowledge & consent of the data subject. e) addresses data minimization in Article 6:"personal data must be 'collected for specified, explicit & legitimate purposes' ". NO, more strict:EU General Data Protection Regulation

Competitor Intelligence: how info is lost/ stolen: #13 Technical Surveillance: a) define, b) t/f: gather nondocumentary evidence? c) the more what the corp spies know what they are looking for & devise a carefully protected plan & more time spent planning, the more likely will/will not be detect. d) what rules are followed for using technical surveillance? 1.729

a) the practice of covertly acquiring audio, visual, or other type of data from targets thru technical devices, procedures & techniques b) TRUE, that can't be found thru open sources c) the more likely will NOT be detected d) - any device left on site must not be traceable back - wiretaps & wiretap devices must blend in w surroundings & not appear out of the ordinary - radio transmitters must not send signals in those parts of the electromagnetic spectrum that are in common commercial use - nothing about the intelligence campaign be revealed to anyone except one's client, even after the job is finished - all documentary evidence of an electronic surveillance campaign should be destroyed once job is finished

Program for Safeguarding Proprietary Information: #2 Security Risk Assessments: a) what is this?, b) what's the function [to ID..] 1.745

a) the process that ID's the co's security RISKS, assess the PROBABILITY those risks will materialize, CALCULATE the DAMAGE & determine the costs of applying the necessary SAFEGUARDS to mitigate [make something less severe or painful] the ID's risks

Competitor Intelligence: how info is lost/ stolen: #12 Physical Surveillance: a) define, b) what are the goals? 1.728

a) the real time observation of a target's actions/ communications b) - TO DISCOVER: who they are, where they live, what the do in spare time, what they want to keep secret, who their friends & enemies are - TO LOOK FOR: cars, homes, recreational activities, levels of income & debts & subject's importance to the co - UNCOVER WHAT THEY THROW IN THE TRASH [financial papers, info re medical problems & family problems] - LEARN ABOUT THEIR ENEMIES [ex lovers, fired ees, political opponents, competitors, peo owed money] - TO MAKE CONTACT W THE TARGET [find out what he thinks about his job, family, life in general & determine the degree to which the target will confide in others]

Competitor Intelligence: how info is lost/ stolen: #13 Technical Surveillance: list the & various forms used: #2 bugging & wiretapping devices: discuss a) the insertion point & b) the technology c) list 8 common devices 1.731

a) to ID, choose area where target info is likely to be discussed/ displayed & where background noise & electronic interference is minimal. ie close to computers, phone equip. OR where hear ee conversations [inside the co & outside ie coffee house, exercise places, meeting rooms, offices] b) need to determine environmental conditions [ie lighting, noise levels, distance from source], risk of device being discovered, power supply issues, access to the device for servicing after installation. c) - satellite tracking systems [tracks time & location info-ie attach to car, uses GPS & converts coordinates to a map. can generate event lists & plain text histories of where traveled] - drop in phone bugs [inserted in an old phone's hand set & conversations are transmitted to a remote receiver where it's recorded. DO blend in & offers minimal risk of exposure , cause person does not check] - carbon microphones [a transducer converts sound to an electrical audio signal and sends to off site recorded. put in fixed location ie break room. IF is DETECTED, target can't locate or recover recorded mat'l] - electronic & magnetic microphones, aka dynamic [good close ranger coverage, smaller than carbon microphone, offers lower range coverage, must place them close to speaker & hide them inside something small] - infinity transmitters [monitor conversations in a room thru a telephone line] - spike & cavity microphones [works best when spy has access to adjoining areas/room. is a small microphone, typically undetectable] - shotguns/ parabolic microphones/ laser audio detection equip [used to listen conversations far away] - wiretaps [place a device into a wire, ie phone, pbx cable, alarm sys, local area network cable. standard phone sys are very vulnerable to wiretapping. taps usually placed inside a telephone box in basement, on lines outside the building, or telephone poles junction boxes near offices. different types: hardwired wiretap, soft wiretap, record wiretap & transmit wiretap

Program for Safeguarding Proprietary Information: #8 Data Retention & Destruction of Policies: a) what should policy detail? b) why important in these times? c) what benefits to the co by having such a policy in place? d) what serious risks & consequences of not adhering to a good data retention & destruction policy? 1.752

a) to detail how info should be created, obtained, used, saved, stored & how long info should be maintained & when destroyed b) bc we have a growing amount, locations & formats of digital info c) *avoid adverse effects from failure to preserve info * min amount of data retained * reduce costs assoc w retaining info * improve info security & reduce risk of data breaches * min amt of info to produce in response to subpoenas * aid in litigation * min risk of destroying info accidentally * reduce the search, retrieval & production costs of litigation related discovery d) monetary fines & sanctions, adverse inference jury instruction sanctions, dismissal of claim or defenses, fines for failing to preserve or mismanaging [spoilage] key doc or data

Program for Safeguarding Proprietary Information: #1 task force: a) function of? b) who to include? c) once assembled, what happens next? 1.745

a) to develop the info security system program b) mgrs & staff from all depts, including: corp security, hr, records mgmt, data processing & legal c) must id info to be protected. to do: 1) ask 'what give the co it's competitive edge?' ie quality of product, service, price, manu tech, marketing & distribution. 2)And ask 'what info would the competitor like to know? 3) then: focus on the info security procedures for each dept [where info is kept & surfey the risk IF info was lost to a competitor]

Program for Safeguarding Proprietary Information: #3 Security Policies & Procedures: a) t/f security polices are usually topic-specific & covering a single subject. b) list a few key policies , c) who is the SANS institute & what can they provide about this topic? 1.746

a) true b) * information classification policy [establishes a framework for categorizing info per it's perceived risk, assigns responsibility for the id'ing & classifying, seeks to insure this is done properly] * acceptable use policy * min access policy [to perform their job] * network access policy [for wireless& wired ports inside the co & outside] * remote access policy [for ees remotely connecting to corp network] * acceptable encryption policy * server security policy [for all server administrators] * extranet policy [ for users outside the co [partners, vendors & suppliers] must comply with before connecting the co's internal networks. * application service provider policy [for any 3rd party entity that manages & distributes p & s] * authentication policy [for users requesting access to the network] * wireless policy [for wireless systems connected to the network] * email security policy [what constitute acceptable & unacceptable use of co's email system] * BOYD policy [guidelines for ee owned devices that access the co's network & systems] c) Escal Institute of Advanced Technologies, was founded in 1989 that specializes in info security, cybersecurity training & selling certificates. it's a nonprofit co. They provide downloadable info security policy templates on their website.

Program for Safeguarding Proprietary Information: # 10: Security Controls: a) t/f: computer networks & communications are inherently insecure & vulnerable to attacks & disruptions . b) what's the objective for securing computer systems & communication networks? c) list common controls

a) true b) to provide a connectivity w acceptable response times, user friendly access & a secure mode at an acceptable cost to the co c) * physical access [hiring security guards, using locks & physical access control devices] * logical access controls * network security * encryption * application security * separation of duties

Competitor Intelligence: how info is lost/ stolen: #11 Social Engineering: how it works: phase #3 Contact & build trust w the target: a) when to do, b) purposes, c) how to establish rapport 1.723

a) when have collected the approp amount of data b) to build trust: - putting targets at ease/making them comfortable - making targets more apt to listen - building the target's confidence c) Establish rapport by: -having a genuine interest in the target - making small talk - presenting a prof, trustworthy appearance - being a good listener - being aware of how they affect other peo - keeping the conversation on topics other then themselves - demonstrating empathy - being knowledgeable - expressing curiosity - finding ways to meet the target's needs - breathing the same rate as the target - matching the target's vocal tones & speech patterns

Competitor Intelligence: how info is lost/ stolen: #11 social engineering: REVERSE social engineering: a) what is, b) this scheme has 3 phases 1.722

a) where social engineers make targets THINK that the engineers CAN HELP them providing SECURITY RELATED services. b) 1) Social Engineers SABOTAGE the target's network or make the target think they have been sabotaged. ie launching network attack on website or send email from spoofed email address indicating their system is infected w malware. Create the (or impression) of the problem. b) 2) Social Engineers place themselves in position to help the target with the problem as [legit] security consultants b) 3) while working on target's network, perform malicious act, while giving the impression that are helping.

Competitor Intelligence: how info is lost/ stolen #11 social engineering: a) why social engineering attacks succeed, b) how social engineering works 1.720

a) works by leveraging attacks against human nature [exploit certain traits of human nature] such as: - tendency to trust peo - reluctance to be [or seem] disagreeable - the desire to help - the desire to avoid appearing paranoid - the desire to be cooperative - the fear of consequences for not doing something right/ doing something wrong - the reluctance to refuse requests - the desire to be nice - the tendency to avoid making others feel bad * it succeeds bc it's diff to combat them b) how works: in 4 phases: 1) gather intelligence about the target 2) select the tactic 3) contact & build trust w the target 4) elicit info by exploiting the relationship

Competitor Intelligence: how info is lost/ stolen: #11 social engineering: 4 phases: # 3 contact & build trust w the target: a) can build try by avoiding suspicious , sensitive questions? , b) how can build trust, c) is it easier to build trust with a smaller target organization? 1.724

a) yes & gather info piece meal over a number of conversations b) - projecting confidence & control - being likeable [sharing common interests] - being believable - making fun of someone together w the targets - sharing common interests - helping with their problems - using humor c) NO, it's harder w smaller co bc targets are more likely to know whether the attacker who he claims to be

competitive intelligence? a) not a growth industry? b) what is SCIP? c) what's the purpose of the SCIP code?

a) yes a growth industry. Used by prof to use info in the public domain/ legally avail resources to compile info to create strategic value b) Society for Competitive Intelligence Professionals . c) purpose: to ID themselves in an inquiry & REFRAIN from using deception in their quest for info

Competitive Intelligence: how info is lost/ stolen: #8 computer attacks: define 1.717

access confidential info by bypassing its info security mechanisms

Competitive intelligence: How info is lost/ stolen: #2 loss of physical media: how to prevent? 1.715

ie loss data loaded onto laptops, usb flash drives, memory cards, tablets, mobile phone, etc. to prevent: encrypt, protect by password & enable for remote detection

Competitive Intelligence: how data is lost/ stolen: #5 malicious insiders: define 1.715

insiders defined: peo w access or inside knowledge of the co. it's one of the largest threats & causes a lot of breaches

Competitive Intelligence: how info is lost/ stolen: #4 improper disposal of doc & media: how to prevent: 1.715

make sure ees are aware: how doc & media are disposed, shred?, bus might sell, return or dispose of machines, cell phones, copy machines. make sure confidential data is removed or sufficiently overwritten.

Competitor Intelligence: how info is lost/ stolen: #9 physical infiltration: what are some countermeasures? 1.718

security officers can implement the thwart attemps: - avoid storing proprietary data in areas visible to public - establish a procedure for tracking & locking up sensitive data - properly bond & ID cleaning crew & control their access - verify vendors' credentials & have co rep escort them during their visit - encrypt any proprietary lists - educate ees to properly store data & question credentials of anyone visiting the site - instruct ees as to what info they may disclose over the phone - require ees to sign nondisclosure agreements

define competitive intelligence 1.702

the ANALYTICAL process that TRANSFORMS disagregated competitor data INTO relevant, accurate & usable knowledge about competitor's positions, performance, capabilities & intentions

define espionage: what 2 further categories can espionage be subdivided into? 1.702

use of ILLEGAL, CLANDESTINE means to gather info. Does NOT cover legitimate intelligence collection & analysis using legal means 1) traditional espionage: refers to gov't sponsored or sanctioned espionage to collect protected info form a FOREIGN gov't [legal espionage] 2) industrial [aka corporate] espionage: the use of ILLEGAL , clandestine means to acquire info for commercial purposes [illegal espionage]

Insider Threats to Proprietary Info: what are the motivations for insider attacks? 1.739

work related grievances financial gain challenge curiosity spying for the competition revenge ego opportunity ideology [i don't like t way the co conducts bus]


Conjuntos de estudio relacionados

Chapter 36: Pain Management in Children

View Set

SAY BETTER WORDS: Vocabulary to know and/or use more

View Set

Cell Bio Final TopHat/Homework Questions

View Set

MEDIEVAL MIDDLE EASTERN HISTORY 100 OBJECTS

View Set

Module 4: Methods of Estate Transfer at Death Quiz 3

View Set

Chapter 3 - Building Marketing Strategy Skip to Main Content (Consumer Behavior)

View Set

Economics of Immigration - Chapter 11

View Set

Voting, Elections, and Campaigns

View Set