Podcast
Questions and Answers
What makes information theft generally invisible to defenders?
What makes information theft generally invisible to defenders?
Which of the following is a reason for underestimating the risk of information compromise?
Which of the following is a reason for underestimating the risk of information compromise?
What type of attack did Keith Rhodes’ team use against a US Government department?
What type of attack did Keith Rhodes’ team use against a US Government department?
According to Rhodes, how secure are user IDs and passwords for protecting SCADA systems?
According to Rhodes, how secure are user IDs and passwords for protecting SCADA systems?
Signup and view all the answers
What is one of the primary causes of information loss in organizations?
What is one of the primary causes of information loss in organizations?
Signup and view all the answers
What vulnerability is introduced by insiders using flash drives?
What vulnerability is introduced by insiders using flash drives?
Signup and view all the answers
Which of the following factors increases the risk of information compromise?
Which of the following factors increases the risk of information compromise?
Signup and view all the answers
What is commonly associated with social engineering attacks?
What is commonly associated with social engineering attacks?
Signup and view all the answers
What is a major concern regarding information security in many British companies?
What is a major concern regarding information security in many British companies?
Signup and view all the answers
Which of the following practices does NOT contribute to vulnerabilities in information protection?
Which of the following practices does NOT contribute to vulnerabilities in information protection?
Signup and view all the answers
How does Chris Davy describe the level of information protection in cases where leaks have occurred?
How does Chris Davy describe the level of information protection in cases where leaks have occurred?
Signup and view all the answers
What risky behavior is commonly observed among employees according to Ponemon (2012)?
What risky behavior is commonly observed among employees according to Ponemon (2012)?
Signup and view all the answers
What is one of the top risky practices identified by Ponemon regarding mobile device use?
What is one of the top risky practices identified by Ponemon regarding mobile device use?
Signup and view all the answers
Which common vulnerability arises from failing to delete unnecessary information on computers?
Which common vulnerability arises from failing to delete unnecessary information on computers?
Signup and view all the answers
What action should be taken immediately if a USB drive containing confidential data is lost?
What action should be taken immediately if a USB drive containing confidential data is lost?
Signup and view all the answers
What is a consequence of leaving computers unattended in public spaces?
What is a consequence of leaving computers unattended in public spaces?
Signup and view all the answers
Which of the following is not considered an adversary route to information disclosure?
Which of the following is not considered an adversary route to information disclosure?
Signup and view all the answers
What is the primary factor affecting the security of information in most companies?
What is the primary factor affecting the security of information in most companies?
Signup and view all the answers
What type of risk is predominantly associated with information theft today?
What type of risk is predominantly associated with information theft today?
Signup and view all the answers
Which of the following is considered a countermeasure against interception of wireless communication?
Which of the following is considered a countermeasure against interception of wireless communication?
Signup and view all the answers
In the context of information security, what do insiders pose a risk of?
In the context of information security, what do insiders pose a risk of?
Signup and view all the answers
What two types of insiders might collaborate in information disclosure?
What two types of insiders might collaborate in information disclosure?
Signup and view all the answers
What should organizations recognize about wireless communication in comparison to wired communications?
What should organizations recognize about wireless communication in comparison to wired communications?
Signup and view all the answers
What historical contract existed between employers and employees regarding security?
What historical contract existed between employers and employees regarding security?
Signup and view all the answers
What is one method that foreign intelligence services (FIS) may use to intercept communications?
What is one method that foreign intelligence services (FIS) may use to intercept communications?
Signup and view all the answers
Which of the following methods is NOT typically used by foreign intelligence services for espionage?
Which of the following methods is NOT typically used by foreign intelligence services for espionage?
Signup and view all the answers
What is a tactic FIS might use during security trade shows?
What is a tactic FIS might use during security trade shows?
Signup and view all the answers
One method FIS could use to gain access to sensitive data includes:
One method FIS could use to gain access to sensitive data includes:
Signup and view all the answers
Which sector is particularly vulnerable to foreign intelligence services?
Which sector is particularly vulnerable to foreign intelligence services?
Signup and view all the answers
What could be a reason for FIS to conduct surreptitious entry?
What could be a reason for FIS to conduct surreptitious entry?
Signup and view all the answers
How might FIS attempt to gain information through corporate partnerships?
How might FIS attempt to gain information through corporate partnerships?
Signup and view all the answers
Which of the following is a reported method of hacking employed by FIS?
Which of the following is a reported method of hacking employed by FIS?
Signup and view all the answers
What is considered to be a more effective method of valuing regular assets than book value?
What is considered to be a more effective method of valuing regular assets than book value?
Signup and view all the answers
What unique characteristic complicates the detection of information theft?
What unique characteristic complicates the detection of information theft?
Signup and view all the answers
Which factor is NOT commonly used to value information?
Which factor is NOT commonly used to value information?
Signup and view all the answers
What can be a potential consequence of information theft for an organization?
What can be a potential consequence of information theft for an organization?
Signup and view all the answers
Why is it complicated to take stock of an organization's information assets?
Why is it complicated to take stock of an organization's information assets?
Signup and view all the answers
Which of the following is a consequence organizations face during and after an information incident?
Which of the following is a consequence organizations face during and after an information incident?
Signup and view all the answers
What aspect of information valuation poses challenges compared to regular asset valuation?
What aspect of information valuation poses challenges compared to regular asset valuation?
Signup and view all the answers
What could be a significant indirect cost resulting from information theft for an organization?
What could be a significant indirect cost resulting from information theft for an organization?
Signup and view all the answers
Which category of employees can be targeted by agents of FIS?
Which category of employees can be targeted by agents of FIS?
Signup and view all the answers
What is a primary characteristic of information brokers?
What is a primary characteristic of information brokers?
Signup and view all the answers
What methods do information brokers use to obtain information?
What methods do information brokers use to obtain information?
Signup and view all the answers
How can the tactics of information brokers be categorized?
How can the tactics of information brokers be categorized?
Signup and view all the answers
Why might lower-ranking employees be more vulnerable to FIS manipulation?
Why might lower-ranking employees be more vulnerable to FIS manipulation?
Signup and view all the answers
Where are information brokers likely to be found networking?
Where are information brokers likely to be found networking?
Signup and view all the answers
Which of the following suggests that information brokers can exploit vulnerabilities?
Which of the following suggests that information brokers can exploit vulnerabilities?
Signup and view all the answers
What is the role of the oil and gas industry concerning information brokers?
What is the role of the oil and gas industry concerning information brokers?
Signup and view all the answers
Study Notes
Introduction
- Information and intellectual capital are more valuable to enterprises than physical assets.
- Most organizations believe their information systems are secure, but in reality, they're not.
Threats to Information
- Adversaries relentlessly target sensitive data.
- Methods include theft, solicitation, inadvertent disclosure, and hostile interception.
- The internet, a crucial communication tool, is also a primary attack and espionage vector.
- National borders and legal jurisdictions create significant challenges.
- Foreign government agencies engage in significant espionage to gain economic advantage.
- Industrial espionage exists between companies, even allies, with information theft as a central tactic.
- Employees and ex-employees can easily steal trade secrets via flash drives or cloud uploads.
Competitive Intelligence
- Competitive intelligence (CI) involves market analysis, competitor profiling, and surveillance for company advantage.
- A fine line exists between legitimate competitive analysis and illegal data acquisition.
- Cyber sabotage, such as data corruption or denial of access, can harm operations more than theft.
- The WannaCry ransomware attack crippled systems in over 150 countries.
The CIA Triad
- Confidentiality: Only authorized personnel can access information.
- Integrity: Information is unaltered and accurate.
- Availability: Authorized users have uninterrupted access to information.
The Information Lifecycle
- Information's value may change over its lifecycle.
- Handwritten notes, for instance, can become digital files and be stored on various platforms.
- Security should be maintained at every stage.
Information Theft and the Law
- Legal approaches to protecting information vary by jurisdiction (most notably between UK and US).
- Intellectual Property (IP) protection includes patents, trademarks, and copyrights.
- Protecting trade secrets is a significant legal concern.
The Adversaries
- Insider threats are common, and often more damaging than external ones.
- Departing employees, who retain considerable company knowledge, represent a major risk category.
- Disgruntled employees pose a significant risk.
- Contract workers and partners can access and/or transfer information.
The Insider Threat
- Malicious insiders are current or former employees, or business partners with unauthorized access compromising information.
- Reasons include financial gain, dispute with the company or desire to sabotage.
- Insider threats are a considerable concern, particularly among those departing the organization.
Operational Security (OpSec)
- OpSec protects innocuous information that could reveal valuable organizational data.
- Secure handling of documents, materials, and interactions is crucial during off-site activities and business dealings.
- Careful planning, maintenance of documentation and regular audits and testing are required.
Incident Response and Investigations
- Preparing for a cybersecurity incident by outlining clearly defined roles and responsibilities is important.
- Regular rehearsals and simulations will assist with preparedness and efficient crisis management.
- Swift reporting and a thorough documentation process are key to incident resolution.
Bibliography and Further Reading
- A variety of sources (from government agencies and private institutions) are provided for more in- depth study.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
This quiz explores the critical aspects of information systems security and the threats they face. It discusses the value of intellectual capital over physical assets and examines various methods of data theft and espionage. Test your understanding of competitive intelligence and the challenges organizations face in safeguarding sensitive data.