{"title":"Keeping company secrets secret","authors":"Arion N. Pattakos CPP, OCP","doi":"10.1002/(SICI)1520-6386(199723)8:3<71::AID-CIR14>3.0.CO;2-3","DOIUrl":null,"url":null,"abstract":"<p>Information security professionals and those they support must understand the threat to company secrets posed by foreign intelligence services, and foreign and domestic competitors, who may use legal or illegal means to acquire those secrets. Implementing protection policies and control measures to prevent the exploitation of corporate secrets requires support from senior management. An eight-step counter-competitor intelligence model is proposed for determining what information requires protection; analyzing, assessing and ranking risks; developing security controls; and conducting an effectiveness review. Once this analysis is completed, an information protection program can be developed or revised, and communicated throughout the corporation. © 1997 John Wiley & Sons, Inc.</p>","PeriodicalId":100295,"journal":{"name":"Competitive Intelligence Review","volume":"8 3","pages":"71-78"},"PeriodicalIF":0.0000,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1002/(SICI)1520-6386(199723)8:3<71::AID-CIR14>3.0.CO;2-3","citationCount":"7","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Competitive Intelligence Review","FirstCategoryId":"1085","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1002/%28SICI%291520-6386%28199723%298%3A3%3C71%3A%3AAID-CIR14%3E3.0.CO%3B2-3","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7
Abstract
Information security professionals and those they support must understand the threat to company secrets posed by foreign intelligence services, and foreign and domestic competitors, who may use legal or illegal means to acquire those secrets. Implementing protection policies and control measures to prevent the exploitation of corporate secrets requires support from senior management. An eight-step counter-competitor intelligence model is proposed for determining what information requires protection; analyzing, assessing and ranking risks; developing security controls; and conducting an effectiveness review. Once this analysis is completed, an information protection program can be developed or revised, and communicated throughout the corporation. © 1997 John Wiley & Sons, Inc.
保守公司秘密
信息安全专业人员及其支持的人员必须了解外国情报部门以及国内外竞争对手对公司机密构成的威胁,他们可能会使用合法或非法手段获取这些机密。实施保护政策和控制措施以防止利用公司机密需要高级管理层的支持。提出了一个八步反竞争情报模型,用于确定哪些信息需要保护;分析、评估和排序风险;制定安全控制措施;以及进行有效性审查。一旦完成该分析,就可以制定或修订信息保护计划,并在整个公司进行沟通。©1997 John Wiley&;股份有限公司。
本文章由计算机程序翻译,如有差异,请以英文原文为准。