Time
2 hours 9 minutes
Difficulty
Beginner
CEU/CPE
2

Video Transcription

00:00
welcome back to acid security course. And in this video I'm going to talk about talk about protecting intellectual property.
00:08
So let's first talk about what you will see in this video, and I'm going to talk about types of intellectual property. And then I'm going to talk about protecting manufacturing process, protecting proprietary technology and its development and protecting people.
00:25
So when you talk about types of intellectual property,
00:30
first of all, their patents,
00:34
then there are manufacturing processes which are included in itself the proprietary technology that can be used by competition or somebody militias.
00:45
Um,
00:47
And then we have proprietary technologies which are not part of manufacturing process. For example, some kind of documentation explaining How do you produce certain material or certain product if it's some kind of mechanical device? What kind off
01:06
terminal treatment is used, what kind off materials are have to be used? What are the margins during manufacturing or during the product production that are allowed in order to achieve the quality that is needed and stuff like that?
01:26
Eso these things that can be Justin paper, not part off actual manufacturing process
01:32
and then you have are in D,
01:34
which is ah, part off
01:38
the whole process of generating intellectual property, and in the end, you have people who are involved in that
01:45
whole process of generating intellectual property. So sometimes you'll just have to find a way to protect not physically them, but the things that that they're working on in terms of things that they have on themselves, which is crucial to development in the intellectual property.
02:06
So patents let me just make sure they're kind of
02:09
things of public knowledge. So they're essentially protected by laws and they're protected by government agencies, so you don't have to protect them. The
02:20
you have the paper saying that physical piece of paper saying that you're to have right to a patent. But this is also recorded in the
02:29
the Patent Office. On the whole content of that patent is there. So the fact that you have these things on paper in your cell, your company, it's just eso you can claim the right to it, but it's not something that you need to protect because there is somebody else doing that instead of you.
02:50
So what we're talking going to talk about today with in terms of protecting intellectual property, starts with protecting manufacturing process.
02:59
And what you have today is that most of manufacturing processes air protected, controlled so in the protected by i o T devices of some kind of SCADA
03:10
array of devices, which are controlling by computer ways off using computers and sensors, your machines that are meant actually manufacturing the products. Of course, there are people mending these machines, but
03:27
the whole process off information flow. Data gathering is done by Iot devices, and these are notoriously insecure
03:36
eso the wire. They're insecure because people who are manufacturing these devices they don't usually issue security updates sometime. It's usually not even remembered by people maintaining the manufacturing processes to do the updates.
03:57
And the reason is very simple. Sometimes when you install the security of there is something might stop working and people who are in charge of manufacturing they are. Primary goal is to make sure that manufacturing is operating at optimal level in terms of productivity and the production. So
04:15
the last thing they want is to do the update of fervor of Iot devices in and something stops working. So this is this is absolute nightmare for them,
04:24
and it's usually not being done
04:28
sometimes is being done if they have redundant devices that they can test and see if everything is working. But it's very expensive, and most of the companies simply avoid that thing.
04:39
So what to do in case of protecting manufacturing process?
04:44
Um, you put the whole manufacturing process on an island or in their gap?
04:50
What does it mean? What the air gap means means that the network on which the all these Iot devices controlling machines in manufacturing process
05:02
are separated from the outside world. There on the separate network, they're not community with anything else from the outside
05:10
for convenience purpose. Sometimes people leave the connection to the corporate network in case they need, for example, to change something in the manufacturing process. So they devise that in the in the R and D or some kind of department inside the company,
05:25
and then they just push it down to the manufacturing.
05:29
This is wrong.
05:30
The biggest advice is to avoid any kind off connection between the island off manufacturing and the other a rest of the world, and to communicate or to transfer any changes.
05:46
Why are portable memory devices and when I say portable memory devices. I'm not thinking about USB flash drives because thes air notoriously known to be able to infect the networks.
05:59
Um,
06:00
what I'm suggesting in this case and I know it sounds crazy because nobody's using them anymore is to use optical drives like CDs or DVDs and to transfer all data to the authorities. In most of the cases, one CD or one D the is has enough size to transfer all of the data you need, because
06:19
in most cases these are not big things. These air, for example, some changes in programming is a couple off lines, or we just need to change everything on software on all I I I o tease. It's still not much so it Zmeskal erred in megabytes, not in gigabytes. And you can do that easily.
06:40
I know that optical device is an optical media is going out of style, but they're still there just for these purposes,
06:48
and I strongly suggest that they are being used in that way.
06:54
When we're talking about protecting proprietary technology, we have two types. We have already developed technology, and essentially then it sits in the storage and you protect it in the same way. Like you protect storage, you limit access,
07:11
you control access, you control access from outside the network.
07:15
Um,
07:17
you can
07:18
keep it turning in a separate storage. And that's it,
07:25
Um,
07:27
you.
07:28
When we talk about the things that have not all been fully developed,
07:33
then we're talking about protecting R and D,
07:38
and when we're protecting R and D, the best way to do it
07:42
is the same thing with like with manufacturing.
07:45
So to put it in on the island, in the air, gapped environment and people in R and D, if they need to communicate with the outside world, they need to switch to the other PC, which is on the corporate network. So it's the best way. Sometimes it's too expensive or
08:03
simply people cannot work in that way.
08:07
Then, at the best way, is to force the access to the Internet through virtualized environment that is separated from the harder. So there are browsers. For example, if you go to the Internet, which browsing them in in micro virtual environment
08:26
and so once you switch off the brother, if you caught any kind of malware drew during browsing or if some of the tried to access it. They cannot access your actual physical machine or date on it. They're accessing just that. That small virtual space within the browser, which is separated for dead browsing session.
08:46
Also, in that case, you need special procedure for exchanging files over mail. It can be automated, but it doesn't have to be So, for example, if if there are some some Softwares that doesn't don't allow
09:05
you to open the email attachment, it has to be first saved to a hard drive
09:11
and then scanned by anti virus and then open. So that's it.
09:16
And, uh,
09:18
yeah, when we talked about the air gap, it's simply not possible all the time.
09:24
Uh,
09:26
so, uh, also, when you talk about protecting our Andy, we have to protect people who are doing the R and D,
09:33
and we're not talking about physical security off them and their families. That is
09:39
the subject off responsibility of people doing physical security. It's a whole different ball game.
09:43
We're talking about,
09:46
for example, issuing them with cryptic mobile phones. So if they're reading their email when there somewhere, they're still protected because even if their mobile phone is stolen, it's pretty much protected from
10:00
any kind of intrusion except on a very high level slash government level.
10:05
And then then you don't have to worry about it. So, for example, fishing mobile phones, which are encrypted,
10:16
uh, companies don't issue these phones to everybody because they're quite expensive. But to some crucial people in R and D or in management, they can be issued,
10:28
then a word using no books.
10:31
Uh, because notebooks can be stolen. And yeah, OK, Big locker corruption
10:37
is good thing, but date that can be accessed even if the hard drive is encrypted. There are ways. If they're not simple, they're expensive. But if you're talking about developing multi $1,000,000 technology than somebody might decides to invest a lot of money into breaking into your encrypted drive and a lot of money, you can do it.
10:58
If no books are have to be used, then use only one that are fully protected with hard based security. Like I was speaking about in protecting data on the section about protecting data on a PC.
11:13
And the final step is that if needed, if these people work a lot of from home than the whole thing, is to secure their home network. So
11:22
people have their home networks. They get whatever to get from there the Internet provider. And it's very below security quality for somebody working with sensitive or crucial data for a company.
11:35
So in this case, you should go to their home and install equipment that can make sure that
11:39
a t least there call network is not easily,
11:43
um uh,
11:46
attacked. And in that case, you need also probably to install some kind of video surveillance. Because even if you put the highest level pregnant in their homes, somebody can break in and simply replace it with the same looking devices, which are
12:05
which are not protected because the protection has to be turned on.
12:13
So in this video, I have been talking about what different types of fight intellectual property exist in a company and accept patents, which are
12:24
no, they don't need any kind of protection. All other kinds of intellectual property are subject to whitey securities focus, and they need to be protected,
12:35
and I also talked about how to protect each of these types of intellectual property
12:41
on the The biggest thing is to convince your management that convenience and ease of faxes, convenience of use. And he's a praxis is sometimes against their best interests
12:54
because they say Okay, these people need to work from home. We have to make sure sure that they can work without interruptions.
13:01
OK, but then we have to install the measures to make sure that whatever they are communicating with the company's network is not Spider, because then what's the whole purpose of security off his date if they can be easily really revealed? So
13:18
I hope you have learned about
13:22
protecting the intellectual property in this lesson, and in next one, I'm going to talk about protecting financial assets.

Up Next

Asset Security Fundamentals

As a cybersecurity professional, it's often your responsibility to set security standards for your organization. In the Asset Security Fundamentals course, you will identify what types of assets need protection and the job roles that are involved.

Instructed By

Instructor Profile Image
Milan Cetic
IT Security Consultant
Instructor