112
Sensitive Sensitive Information Information Sample Questions

Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

Embed Size (px)

Citation preview

Page 1: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

Sensitive InformationSensitive Information

Sample Questions

Page 2: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

1. Any formula, pattern, device or compilation of information which is used in one’s business and which gives him an opportunity to gain an advantage over competitors who do not know or use it is:

• a. A monopoly

• b. An unfair trade practice

• c. A trade secret

• d. A patent

Page 3: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

1. Any formula, pattern, device or compilation of information which is used in one’s business and which gives him an opportunity to gain an advantage over competitors who do not know or use it is:

• a. A monopoly

• b. An unfair trade practice

• c. A trade secret

• d. A patent

Page 4: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

2. Probably the main reason for loss of sensitive information is:

• a. Inadvertent disclosure

• b. Deliberately stolen by outsider

• c. Industrial espionage

• d. Deliberately stolen by insider

Page 5: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

2. Probably the main reason for loss of sensitive information is:

• a. Inadvertent disclosure

• b. Deliberately stolen by outsider

• c. Industrial espionage

• d. Deliberately stolen by insider

Page 6: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

3. The primary tool of pre-employment screening is the:

• a. Interview

• b. Application form

• c. The investigation

• d. The investigator

Page 7: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

3. The primary tool of pre-employment screening is the:

• a. Interview

• b. Application form

• c. The investigation

• d. The investigator

Page 8: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

4. Competitive intelligence gathering is a legitimate activity which is engaged in by many firms throughout the world. The most important function of competitive intelligence is to:• a. Alert senior management to marketplace

changes in order to prevent surprise• b. Alert senior management as to the personal

habits of competitive senior management

• c. Alert government intelligence agencies to marketplace changes

• d. Alert senior management to changes in protocol in foreign countries

Page 9: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

4. Competitive intelligence gathering is a legitimate activity which is engaged in by many firms throughout the world. The most important function of competitive intelligence is to:• a. Alert senior management to marketplace

changes in order to prevent surprise

• b. Alert senior management as to the personal habits of competitive senior management

• c. Alert government intelligence agencies to marketplace changes

• d. Alert senior management to changes in protocol in foreign countries

Page 10: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

5. The instrument used to monitor telephone call by providing a record of all numbers dialed from a particular phone is called:

• a. A wiretap

• b. A bug

• c. An electronic surveillance

• d. A pen register

Page 11: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

5. The instrument used to monitor telephone call by providing a record of all numbers dialed from a particular phone is called:

• a. A wiretap

• b. A bug

• c. An electronic surveillance

• d. A pen register

Page 12: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

6. A clandestine listening device, generally a small hidden microphone and radio transmitter is known as :

• a. A bug

• b. A wiretap

• c. A tempest

• d. A beeper

Page 13: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

6. A clandestine listening device, generally a small hidden microphone and radio transmitter is known as :

• a. A bug

• b. A wiretap

• c. A tempest

• d. A beeper

Page 14: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

7. A microphone with a large disk-like attachment used for listening to audio from great distances is known as:

• a. Contact microphone

• b. Spike microphone

• c. Parabolic microphone

• d. Moving coil microphone

Page 15: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

7. A microphone with a large disk-like attachment used for listening to audio from great distances is known as:

• a. Contact microphone

• b. Spike microphone

• c. Parabolic microphone

• d. Moving coil microphone

Page 16: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

8. Sound waves too high in frequency to be heard by the human ear, generally above 20 KHZ are known as:

• a. Microwaves

• b. Ultrasonic

• c. High frequency

• d. Short-wave

Page 17: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

8. Sound waves too high in frequency to be heard by the human ear, generally above 20 KHZ are known as:

• a. Microwaves

• b. Ultrasonic

• c. High frequency

• d. Short-wave

Page 18: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

9. Two methods of protection against telephone line eavesdropping are apparently reliable. The first method is “don’t discuss sensitive information” and the other is:• a. To use a wire tap detector

• b. To use a radio jammer

• c. To use an audio jammer

• d. To use encryption equipment

Page 19: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

9. Two methods of protection against telephone line eavesdropping are apparently reliable. The first method is “don’t discuss sensitive information” and the other is:• a. To use a wire tap detector

• b. To use a radio jammer

• c. To use an audio jammer

• d. To use encryption equipment

Page 20: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

10. The unauthorized acquisition of sensitive information is known as:

• a. Industrial espionage

• b. Embezzlement

• c. Larceny

• d. False pretenses

Page 21: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

10. The unauthorized acquisition of sensitive information is known as:

• a. Industrial espionage

• b. Embezzlement

• c. Larceny

• d. False pretenses

Page 22: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

11. Proprietary information is:

• a. Information which must be so classified under government order

• b. Private information of highly sensitive character

• c. Defense data which must be classified according to federal regulations

• d. Anything that an enterprise considers relevant to its status or operations and does not want to disclose publicly

Page 23: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

11. Proprietary information is:

• a. Information which must be so classified under government order

• b. Private information of highly sensitive character

• c. Defense data which must be classified according to federal regulations

• d. Anything that an enterprise considers relevant to its status or operations

and does not want to disclose publicly

Page 24: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

12. A trade secret is:

• a. Any formula, pattern, device or compilation of information which is used in one’s business and which gives that business an opportunity to

gain an advantage over competitors who do not know or use it

• b. All information about a company which the company desires to protect

• c. Information of a company which is registered as such with the Patent Office

• d. Information so designated by the government

Page 25: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

12. A trade secret is:

• a. Any formula, pattern, device or compilation of information which is used in one’s business and which gives that business an opportunity to

gain an advantage over competitors who do not know or use it

• b. All information about a company which the company desires to protect

• c. Information of a company which is registered as such with the Patent Office

• d. Information so designated by the government

Page 26: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

13. The control software of a Private Board Exchange (PBX) can be accessed and compromised by calling the telephone number of a device on the PBX from a computer and modem. The name of this PBX device is the:

• a. Time Domain Reflectometer

• b. Remote Maintenance Access Terminal

• c. Current Carrier Signaling Port

• d. Internal and Remote Signal Port

Page 27: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

13. The control software of a Private Board Exchange (PBX) can be accessed and compromised by calling the telephone number of a device on the PBX from a computer and modem. The name of this PBX device is the:

• a. Time Domain Reflectometer

• b. Remote Maintenance Access Terminal

• c. Current Carrier Signaling Port

• d. Internal and Remote Signal Port

Page 28: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

14. Which of the following is generally not true in regard to proprietary information?• a. Secret information does not have to be

specifically identifiable• b. Secret information must be such that it

can be effectively protected• c. The more narrowly a business defines what

it regards as secret, the easier it is to protect that body of information

• d. It is difficult to protect as a trade secret that which can be found in publicly

accessible sources

Page 29: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

14. Which of the following is generally not true in regard to proprietary information?• a. Secret information does not have to be

specifically identifiable• b. Secret information must be such that it

can be effectively protected• c. The more narrowly a business defines what

it regards as secret, the easier it is to protect that body of information

• d. It is difficult to protect as a trade secret that which can be found in publicly

accessible sources

Page 30: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

15. With respect to trade secrets, it may be decided that its disclosure by another was innocent rather than wrongful even in the case where the person making the disclosure really was guilty of malice or wrong intent. This situation may occur when:

• a. There is absence of evidence that an owner has taken reasonable precautions to

protect confidential information• b. The trade secret was not registered• c. The trade secret did not involve national

defense information• d. The trade secret was not in current use

Page 31: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

15. With respect to trade secrets, it may be decided that its disclosure by another was innocent rather than wrongful even in the case where the person making the disclosure really was guilty of malice or wrong intent. This situation may occur when:

• a. There is absence of evidence that an owner has taken reasonable precautions to protect confidential information

• b. The trade secret was not registered• c. The trade secret did not involve national

defense information• d. The trade secret was not in current use

Page 32: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

16. The class of person under a duty to safeguard a proprietary secret is known as:

• a. Agents

• b. Principals

• c. Fiduciaries

• d. Business Associates

Page 33: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

16. The class of person under a duty to safeguard a proprietary secret is known as:

• a. Agents

• b. Principals

• c. Fiduciaries

• d. Business Associates

Page 34: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

17. Which of the following is not a correct statement, or a general rule, involving the protection of proprietary information?

• a. By operation of common law employees are presumed to be fiduciaries to the extent they may not disclose secrets of their employers without authorization

• b. As a class, employees are the largest group of persons bound to secrecy because of their status or relationship

• c. Other than employees, any other persons to be bound to secrecy must agree to be so bound

• d. Any agreements to be bound must always be in writing and are not implied from acts

Page 35: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

17. Which of the following is not a correct statement, or a general rule, involving the protection of proprietary information?

• a. By operation of common law employees are presumed to be fiduciaries to the extent they may not disclose secrets of their employers without authorization

• b. As a class, employees are the largest group of persons bound to secrecy because of their status or relationship

• c. Other than employees, any other persons to be bound to secrecy must agree to be so bound

• d. Any agreements to be bound must always be in writing and are not implied from acts

Page 36: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

18. Probably the chief reason for the loss of information about sensitive operations is:

• a. Deliberately stolen by an outsider

• b. Loss by fire or other disaster

• c. Deliberately stolen by insider

• d. Lost through inadvertent disclosure

Page 37: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

18. Probably the chief reason for the loss of information about sensitive operations is:

• a. Deliberately stolen by an outsider

• b. Loss by fire or other disaster

• c. Deliberately stolen by insider

• d. Lost through inadvertent disclosure

Page 38: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

19. The term “eavesdropping” refers to:

• a. Wiretapping only

• b. “Bugging” only

• c. Both wiretapping and “bugging”

• d. Mail covers

Page 39: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

19. The term “eavesdropping” refers to:

• a. Wiretapping only

• b. “Bugging” only

• c. Both wiretapping and “bugging”

• d. Mail covers

Page 40: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

20. A microphone which has the characteristics of requiring no power source to operate it, is quite small, relatively difficult to detect, and is offered by equipment suppliers in such items as cuff links and hearing aides is known as:

• a. Carbon microphone

• b. Dynamic microphone

• c. Contact microphone

• d. Parabolic microphone

Page 41: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

20. A microphone which has the characteristics of requiring no power source to operate it, is quite small, relatively difficult to detect, and is offered by equipment suppliers in such items as cuff links and hearing aides is known as:

• a. Carbon microphone

• b. Dynamic microphone

• c. Contact microphone

• d. Parabolic microphone

Page 42: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

21. A microphone which is normally installed on a common wall adjoining a target area when it is impractical or impossible to enter the area to make a microphone installation is:

• a. Carbon microphone

• b. Dynamic microphone

• c. Contact microphone

• d. Parabolic microphone

Page 43: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

21. A microphone which is normally installed on a common wall adjoining a target area when it is impractical or impossible to enter the area to make a microphone installation is:

• a. Carbon microphone

• b. Dynamic microphone

• c. Contact microphone

• d. Parabolic microphone

Page 44: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

22. Which of the following is not true with regard to electronic eavesdropping:

• a. A listening device installed in a wire will cause a crackling sound, click or other noise than can be heard on the line

• b. An effective countermeasures survey to detect evidence of electronic eavesdropping in telephone equipment must be conducted by a person technically familiar with such equipment

• c. All wiring should be traced out and accounted for in a countermeasures survey

• d. In a countermeasures survey to detect electronic eavesdropping. A physical search should be utilized as well as an electronic search

Page 45: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

22. Which of the following is not true with regard to electronic eavesdropping:

• a. A listening device installed in a wire will cause a crackling sound, click or other noise than can be heard on the line

• b. An effective countermeasures survey to detect evidence of electronic eavesdropping in telephone equipment must be conducted by a person technically familiar with such equipment

• c. All wiring should be traced out and accounted for in a countermeasures survey

• d. In a countermeasures survey to detect electronic eavesdropping. A physical search should be utilized as well as an electronic search

Page 46: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

23. In designing a proprietary information protection program, the area of greatest vulnerability is:

• a. Personnel files

• b. Marketing data

• c. Employees

• d. Computers

Page 47: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

23. In designing a proprietary information protection program, the area of greatest vulnerability is:

• a. Personnel files

• b. Marketing data

• c. Employees

• d. Computers

Page 48: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

24. Two of the three most common methods of information losses are inadvertent disclosure and industrial espionage. Which of the following is the third:

• a. Newspaper articles

• b. Television

• c. Magazine articles

• d. Theft by an insider

Page 49: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

24. Two of the three most common methods of information losses are inadvertent disclosure and industrial espionage. Which of the following is the third:

• a. Newspaper articles

• b. Television

• c. Magazine articles

• d. Theft by an insider

Page 50: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

25. Which of the following statements is incorrect with regard to an information security program?

• a. A good information security program will provide absolute protection against an enemy spy

• b. The information security program is an attempt to make theft of sensitive information

difficult, not necessarily eliminate it

• c. A trust relationship must be established and maintained with employees

• d. The good will and compliance of employees is crucial for success

Page 51: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

25. Which of the following statements is incorrect with regard to an information security program?

• a. A good information security program will provide absolute protection against an enemy spy

• b. The information security program is an attempt to make theft of sensitive information

difficult, not necessarily eliminate it

• c. A trust relationship must be established and maintained with employees

• d. The good will and compliance of employees is crucial for success

Page 52: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

26. Vital records normally constitute the following percentage of the company’s total records:

• a. 2%

• b. 5%

• c. 10%

• d. 15%

Page 53: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

26. Vital records normally constitute the following percentage of the company’s total records:

• a. 2%

• b. 5%

• c. 10%

• d. 15%

Page 54: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

27. A specially constructed microphone attached directly to an object or surface to be protected and which responds only when the protected object or surface is disturbed is known as:

• a. Parabolic microphone

• b. Special audio microphone

• c. Contact microphone

• d. Surreptitious microphone

Page 55: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

27. A specially constructed microphone attached directly to an object or surface to be protected and which responds only when the protected object or surface is disturbed is known as:

• a. Parabolic microphone

• b. Special audio microphone

• c. Contact microphone

• d. Surreptitious microphone

Page 56: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

28. “Social engineering” is:• a. The conversation involved in the beginning of a

romantic relationship• b. A function of the personnel department in which

like persons are teamed together in workshops or seminars for maximum productivity

• c. The subtle elicitation of information without revealing the true purpose of the call

• d. The specific design of a business structure to facilitate the interaction of the inhabitants

Page 57: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

28. “Social engineering” is:• a. The conversation involved in the beginning of a

romantic relationship• b. A function of the personnel department in which

like persons are teamed together in workshops or seminars for maximum productivity

• c. The subtle elicitation of information without revealing the true purpose of the call

• d. The specific design of a business structure to facilitate the interaction of the inhabitants

Page 58: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

29. A former employee, who had access to your trade secret information, is now employed by a competitor and is apparently using the trade secret information to gain market share. There are several serious factors you should consider before you institute litigation in the matter. Which of the following is not a serious factor to be considered?• a. You may have to expose the very secrets you are

attempting to protect

• b. The cost of the litigation may exceed the value of the secret information

• c. You may lose your case

• d. Other employees may leave the company and attempt to use trade secret information in the business of a new employer

Page 59: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

29. A former employee, who had access to your trade secret information, is now employed by a competitor and is apparently using the trade secret information to gain market share. There are several serious factors you should consider before you institute litigation in the matter. Which of the following is not a serious factor to be considered?• a. You may have to expose the very secrets you are

attempting to protect

• b. The cost of the litigation may exceed the value of the secret information

• c. You may lose your case

• d. Other employees may leave the company and attempt to use trade secret information in the business of a new employer

Page 60: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

30. Electromagnetic radiation is detectable electromagnetic energy is generated by electronic information processing devices. Which of the following is used to protect very sensitive equipment?

• a. A current carrier device

• b. Pneumatic cavity shielding

• c. Tempest shielding

• d. Pen register shielding

Page 61: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

30. Electromagnetic radiation is detectable electromagnetic energy is generated by electronic information processing devices. Which of the following is used to protect very sensitive equipment?

• a. A current carrier device

• b. Pneumatic cavity shielding

• c. Tempest shielding

• d. Pen register shielding

Page 62: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

Significant NotesSignificant Notes

Sensitive Information

Page 63: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

The basis for any industrial espionage prevention program is

protection of information

Page 64: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

There are many kinds of information which a company would like to keep in a confidential status but not all such information could be classified as “trade secrets”

Page 65: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

One definition of “trade secret” is “information including formula, pattern, compilation, program, device, method, technique or process that;

a. Derives independent economic value, actual or potential, from not being generally known to and not being readily ascertainable by proper means, by other persons who can obtain economic value from its disclosure or use, and

b. Is the subject of efforts that are reasonable under the circumstances to maintain its secrecy.

Page 66: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

“Proprietary information” is information of value owned by or entrusted to a company which relates to the operations of the company and which has not been disclosed publicly

Page 67: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

A “trade secret” is part of a company’s proprietary information but not all propriety information necessarily fits the definition of “trade secret” information

Page 68: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

Generally “trade secrets” are given a higher degree of legal protection than other proprietary information

Page 69: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

There are three basic requirements of a “trade secret”

a. Must be of competitive advantageb. Must be secretc. Must be used in the business of

the owner

Page 70: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

Information must meet the following requirements to fit the definition required of a “trade secret”

a. Must be specifically identifiableb. Cannot be found in publicly accessible sourcesc. Should be disclosed by owner only to those under a

duty to protect secrecyd. Persons afforded knowledge of secret information

must know it to be confidentiale. The owners must be able to show they have

instituted adequate protective measures to safeguard secrecy of date

Page 71: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

Unless the owner of a trade secret can furnish proof of diligent care in the protection of a trade secret, such trade secret may be lost

Page 72: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

Patent laws provide that an inventor who first develops a new machine, manufacturing process, composition or matter, plan or design that is sufficiently novel and useful can apply for and receive an exclusive right to that invention for a period of 17 years

Page 73: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

“Inadvertent disclosure” probably is the chief reason for loss of information about sensitive operations

Page 74: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

One method important in protection of sensitive information is installing an effective “awareness program” to assure all employees are aware of the existence of sensitive data in the company and their responsibilities in protecting such

Page 75: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

Another important protective device is the use of “nondisclosure agreements”(employee patent and

secrecy agreements) from employees in which the employees acknowledge their fiduciary responsibility

Page 76: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

A “non-competitive agreement” is agreement on part of employee upon leaving employment of one company that the employee will not accept employment with a defined competitor for a stated period of time

Page 77: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

A telephone instrument may also be utilized as a listening device

Page 78: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

In an electronic countermeasure survey, note that light switches and electrical outlets are favorite places to install listening devices

Page 79: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

Most loss of proprietary information occurs because of negligence

Page 80: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

One very important protective measure used to safeguard sensitive data is to disclose such only in a need-to-know basis

Page 81: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

Theft of sensitive information through industrial espionage methods or other methods of outside theft accounts for a smaller loss than through negligence; however, the loss through outside theft is more dangerous because the data stolen is usually the most valuable

Page 82: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

One of the biggest problems in designing a proprietary information protection program is caused by the large amount of vital data processed and analyzed electronically

Page 83: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

Employees are the greatest vulnerability in a proprietary information protection program. Accordingly, an employee awareness program is necessary whereby they are educated with regard to their responsibilities in protecting sensitive data.

Page 84: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

Definitions

• Proprietary Information– Information over which the possessor

asserts ownership and which is related to the activities or status of the possessor in some special way

Page 85: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

Definitions

• Patent

– A government grant conveying and securing the exclusive right to make, use, and sell an invention for a term of years (seventeen)

Page 86: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

Trade Secret• A trade Secret is a process or device for

continuous use in the operation of the business

• For trade secret protection, must prove– Secrecy– Value– Use in the owner’s business

Page 87: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

Trade Secret

• Trade Secret information is entitled by law to more protection than other kinds of proprietary information

Page 88: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

Trade Secret• The following are not trade secrets:

– Salary information

– Rank surveys

– Customer usage evaluation

– Profitability margins

– Unit costs

– Personnel changes

Page 89: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

Trade Secret / Patent

• A trade secret remains secret as long as it continues to meet trade secret tests but the exclusive right to patent protection expires after 17 years

Page 90: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

Trade Secret / Patent

• Since anyone can purchase a patent, there are not industrial espionage targets in a patented invention

• Trade Secrets are targets

Page 91: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

Proprietary Information

• Two approaches used to deal with P.I.:• “Property Concept”

– regards the information as having independent value if it amounts to a trade secret

• “Fiduciaries” – Imposition of duties upon certain classes of

people, other than the owner not to use or divulge info without owner’s consent.

Page 92: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

Proprietary Information

• There are 3 broad threats to proprietary information:

– It can be lost through inadvertent disclosure– It can be deliberately stolen by an outsider– It can be deliberately stolen by an insider

Page 93: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

Competitive Intelligence Gathering

• The most important function of competitive intelligence gathering is to alert senior management to marketplace changes in order to prevent surprise

Page 94: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

Competitive Intelligence Gathering

• A rich source of information is in the information provided to government regulators

• Never reveal information to anyone that you would not reveal to a competitor

Page 95: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

Industrial Espionage

• Industrial espionage is the theft of information by legal or illegal means. It is more dangerous than inadvertent disclosure by employees in that highly valuable information is stolen for release to others who plan to exploit it.

Page 96: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

Protection Programs

• The vulnerability assessment is conducted from the perspective of the competitor and considers:– What critical information exists– The period of time when the information is

critical. This may be a short period or may be for the life of a product

– The identity of employees and indirect associates who have access to the information

Page 97: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

Eavesdropping Tactics & Equipment

• “Wiretapping” - is the interception of communication over a wire w/o participants consent and requires physical entry into the communication circuit

• “Bugging” - interception of communication w/o participants consent by means of electronic devices and w/o penetration of a wire.

Page 98: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

Eavesdropping Tactics & Equipment

• Eavesdropping is a psychological traumatic experience for the victim.

• It is the most devastating of espionage techniques.

Page 99: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

Wired microphones

• Carbon microphone – commonly used in a standard telephone handset

• Crystal microphone– generates a small electrical current when the

crystal is vibrated by sound waves

• Contact microphone– installed on a common wall with the target area

Page 100: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

Wired microphones

• Spike microphone– installed in a hole in the common wall

(not fully through)

• Dynamic microphone– movement of a small wire near a permanent

magnet converts sound into electrical energy. Good eavesdropping device which operates as a loudspeaker in reverse

Page 101: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

Wired microphones

• Pneumatic cavity device– has a specially designed small cavity which picks

up surface vibrations. (Glass tumbler effect)

• Condenser microphone– high fidelity use. Fragile and sensitive

• Electret microphone– used primarily in P.A. and audio recording.

(Extremely small)

Page 102: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

Wired microphones

• Omnidirectional microphone– used in conferences. Picks up sound from many

directions around the room

• Cardioid microphone– picks up sound from directly in front of mic

• Parabolic microphone – gathers audio energy and directs it to a

conventional microphone in the center of a dish-type reflector

Page 103: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

Wireless microphones

• A radio frequency (RF) device. Consists of:

– A microphone

– A transmitter

– A power supply

– An antenna; and,

– A receiver

Page 104: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

Light transformation

• 1. Infrared light wave transmissions use light waves invisible to the human eye. Sound waves are converted to electronic impulses and the pulses are used to modulate infrared light waves. Similar to a TV remote

Page 105: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

Light transformation

• 2. Laser (Light Amplification by Stimulated Emission of Radiation) transmission of sound does not require any equipment in the surveillance area. A laser beam focused on a window pane or a reflective object in the room. The vibrating glass modulates a reflected laser beam. Rarely used due to interference.

Page 106: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

Light transformation

• 3. Fiber optic laser transmission uses a communications grade glass fiber, filled with laser light, routed through the surveillance area. Sound waves cause the fiber to vibrate slightly, altering the laser light.

Page 107: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

Electromagnetic radiation

• Detectable electromagnetic energy is generated by electronic information processing devices. Detection is possible for several hundred feet. The “faraday cage” or “tempest shielding” is used for very sensitive equipment.

Page 108: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

Telephone eavesdropping

• Digital systems - originally thought to be secure:

• Digit stream can be recorded and converted to analog and speech.

• The control system is available from an on-site terminal or from off-site through the network. (Remote Maintenance Access Terminal) (RMAT)

Page 109: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

The Eavesdropping Threat

• Risk for the electronic eavesdropper is low:– electronic eavesdropping is easily committed– chances are low that victim will find the device– chances low, if found, can be tied to eavesdropper– prosecution of eavesdropping cases is rare; and,– the reward far outweighs the risk

Page 110: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

Miscellaneous• Plenum

– space above a dropped ceiling

• Variable Path Encryption (VPE)• is particularly useful to secure cellular signals.

A call is made to a toll-free number of the VPE provider. A unit attached to the cellular set and a unit at the VPE provider alter the communication between them. The signal is sent in the clear from the VPE provider to the intended destination of the call

Page 111: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

Miscellaneous

• Time domain reflectometry– an electronic picture of the telephone

line at a given time which is compared to the same line at a future time

Page 112: Sensitive Information Sample Questions. 1.Any formula, pattern, device or compilation of information which is used in one’s business and which gives him

Miscellaneous

• Audio masking– generation of noise at the perimeter

of the secure area to cover or mask conversation. Music is not used; “white” or “pink” noise is not as easily filtered from the tape