Abstract

Information security includes the information protection measures such as marking, storage, proper transmission, and destruction of information. It also encompasses information technology (IT) security to protect the automated information systems, the hardware, the software, and the data being stored, processed, or transmitted through them as well as the protection of intellectual property rights (IPR). This chapter provides an overview of the information security and counterintelligence, the primary threats to information and intangible assets, identify the various types of information security vulnerabilities, reasonable risk mitigation and security measures, the role of the professional protection officer and security service providers in the protection of sensitive information and intangible assets. The counterintelligence activities include any measures taken to negate intelligence collection efforts against an organization or its people and may be defensive or offensive in nature. The threats to information and intangible assets may be intentional, natural, and inadvertent. The methods that comprise the threat to information assets cover the gamut from old, the time-tested techniques to new, and the innovative collection measures such as data mining, electronic eavesdropping, theft of hardcopy information, and theft of softcopy information/media. Technology, which is moving and advancing at an amazing pace, results in wonderful opportunities for information sharing, productivity, and accomplishment; however, it also represents a new paradigm for security risks. Following a thorough risk assessment, an orchestrated suite of security, legal, and management solutions are applied to the identified organizational risks. The protection officers play a key role in the protection of information and intangible assets, influence the reputation of an organization by presenting a highly competent and professional image, and acknowledge the nature of the assets that they are responsible for protecting.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call