102¦~4¤ë¸¹ ¹D ªk ªk °T (252) |
DEEP & FAR |
|
°]°È³¡§@¬°´¼¼z°]²£»PÃöÁä¸ê°T»ùÈ ºÞ²z¤Hªº¨¤¦â¡G ¾Þ§@¦w¥þ¹ï»ùȪº½ÄÀ» L. Burke Files |
ªL
©¾ ±M§Q¤G²Õ°Æ¥D¥ô ¡E
²MµØ¤j¾Ç¤uµ{»P¨t²Î¬ì¾Ç¨t |
|
|
||
ºKn ´¼¼z°]²£»PÃöÁä¸ê°T(intellectual property and critical information¡AIPCI)¤w¸g¦¨¬°«n¤½¥q¸ê²£¡A¯S§O¬O¬Y¨Ç¥ø·~¤¤¡C¥§¡¨Ó»¡¡A«HÅA(goodwill)©MµL§Î¸ê²£(intangibles)¥Nªí¤F¤½¥q»ùȪº¦Ê¤À¤§¤C¤Q¤¡A¦ý¥Ñ©óµsÅÑ¡B¬ª±K»P¤£·Vªº¤½¶}¡A¥ø·~¥¿¦b³à¥¢¥L̪º´¼¼z°]²£»PÃöÁä¸ê°T¡A¦Ó¤ñ¦b¾ú¥v¤Wªº¥ô¦ó®É¶¡ÁÙ§ó§Ö¡C¬°¤F½T«O¤½¥qÃѧO¥X¨äIPCIªº»ùÈ¡A³o¨Ç¸ê°T¥²¶·¦b¸ê²£¤¸¯Àï¥U(assets elements registry)¤¤³QÃѧO»P¤ÀÃþ --- ³Ì¾A¦X°]°È³¡ªùªº¥ô°È¡C³Ð³y¤F³o¼ËªºÃ¯¥U«á¡AIPCI¥²¶·³Q«OÅ@¡C¦p¦P¥H«Â¯Ù¬°°ò¦ªººÞ²z¹Lµ{(threat-based management process)¡A¾Þ§@¦w¥þ(operational security¡AOPSEC)¬O¤@Ó¤½¥q¥i¥H¨Ï¥Î¨Ó«OÅ@¨äIPCIªº³Ì¦³®Ä²v¤u¨ã¡C¸ê²£¤¸¯Àï¥U©MOPSEC±N¦P®É¹ï¤½¥qªºµû¦ô»PÁZ®Ä²£¥Í«¤jªº½ÄÀ»¡A¨Ã¥B±N·|±N¨ä´¦µo(exposure)¨î¨ì»P¸ê²£¡B»ùÈ©M´¦ÅS°ÝÃD¬ÛÃöªº³d¥ô(liabilities related to assets, value and disclosure issues)¡C ¾É½× ¥»¤å±N·|±´°Q¡A§@¬°²{¥N¤½¥q«n¸ê²£ªº´¼¼z°]²£»PÃöÁä¸ê°T(IPCI)ªº¥X²{»Ýn°]°È³¡ªù©P¼{ªº«·s§@·~(re-tasking)¡A¯S§O¬O¦b°ª«×¨Ì¿àIPCIªº¥ø·~¡C ÃѧO¡B·|p©M«OÅ@IPCIªº¥ô°È(tasks of identification, accounting and protection)¥²¶·³Q³B²z¡A¥H½T«O¨ä»ùȦP®É³Q¹B¥Î¤Î«OÅ@¡CµM¦Ó¡A¦b¦h¼Æªº²Õ´¤¤¡AIPCIªº»ùȬO¥¼©w¸qªº¯S¼x¡A¥B¥¼©w¸qªº°ÝÃD¨ã¦³µLªº¸Ñ¨M¤è¦¡---¥]§t³\¦hÆF¥©ªº¡B»ª¦ü¯u¹êªº¤Î¿ù»~ªº¤è¦¡¡C¦pªG¸Ó¤½¥q±ý¦¨¥\«OÅ@¨ä¸ê²£¡A«hÃѧO¡B½LÂI¡B»{ÃÒ¡BºÊ±±©M«OÅ@IPCIªº¹Lµ{(process of identification, inventory, qualification, monitoring and protecting)»Ýn°]°È»P¸gÀç¡Bª÷¿Ä¡Bªk«ß©M¬ì§Þ³¡ªù¤§¶¡¨ó½Õ¤@Pªº§V¤O¡C |
||