102¦~4¤ë¸¹ ¹D ªk ªk °T (252)

DEEP & FAR

 

 
  °]°È³¡§@¬°´¼¼z°]²£»PÃöÁä¸ê°T»ù­È
ºÞ²z¤Hªº¨¤¦â¡G
¾Þ§@¦w¥þ¹ï»ù­Èªº½ÄÀ»
L. Burke Files

 

 

ªL ©¾ ±M§Q¤G²Õ°Æ¥D¥ô

¡E      ²MµØ¤j¾Ç¤uµ{»P¨t²Î¬ì¾Ç¨t

 

 

ºK­n

´¼¼z°]²£»PÃöÁä¸ê°T(intellectual property and critical information¡AIPCI)¤w¸g¦¨¬°­«­n¤½¥q¸ê²£¡A¯S§O¬O¬Y¨Ç¥ø·~¤¤¡C¥­§¡¨Ó»¡¡A«HÅA(goodwill)©MµL§Î¸ê²£(intangibles)¥Nªí¤F¤½¥q»ù­Èªº¦Ê¤À¤§¤C¤Q¤­¡A¦ý¥Ñ©óµsÅÑ¡B¬ª±K»P¤£·Vªº¤½¶}¡A¥ø·~¥¿¦b³à¥¢¥L­Ìªº´¼¼z°]²£»PÃöÁä¸ê°T¡A¦Ó¤ñ¦b¾ú¥v¤Wªº¥ô¦ó®É¶¡ÁÙ§ó§Ö¡C¬°¤F½T«O¤½¥qÃѧO¥X¨äIPCIªº»ù­È¡A³o¨Ç¸ê°T¥²¶·¦b¸ê²£¤¸¯Àï¥U(assets elements registry)¤¤³QÃѧO»P¤ÀÃþ --- ³Ì¾A¦X°]°È³¡ªùªº¥ô°È¡C³Ð³y¤F³o¼ËªºÃ¯¥U«á¡AIPCI¥²¶·³Q«OÅ@¡C¦p¦P¥H«Â¯Ù¬°°ò¦ªººÞ²z¹Lµ{(threat-based management process)¡A¾Þ§@¦w¥þ(operational security¡AOPSEC)¬O¤@­Ó¤½¥q¥i¥H¨Ï¥Î¨Ó«OÅ@¨äIPCIªº³Ì¦³®Ä²v¤u¨ã¡C¸ê²£¤¸¯Àï¥U©MOPSEC±N¦P®É¹ï¤½¥qªºµû¦ô»PÁZ®Ä²£¥Í­«¤jªº½ÄÀ»¡A¨Ã¥B±N·|±N¨ä´¦µo(exposure)­­¨î¨ì»P¸ê²£¡B»ù­È©M´¦ÅS°ÝÃD¬ÛÃöªº³d¥ô(liabilities related to assets, value and disclosure issues)¡C

 

¾É½×

¥»¤å±N·|±´°Q¡A§@¬°²{¥N¤½¥q­«­n¸ê²£ªº´¼¼z°]²£»PÃöÁä¸ê°T(IPCI)ªº¥X²{»Ý­n°]°È³¡ªù©P¼{ªº­«·s§@·~(re-tasking)¡A¯S§O¬O¦b°ª«×¨Ì¿àIPCIªº¥ø·~¡C

ÃѧO¡B·|­p©M«OÅ@IPCIªº¥ô°È(tasks of identification, accounting and protection)¥²¶·³Q³B²z¡A¥H½T«O¨ä»ù­È¦P®É³Q¹B¥Î¤Î«OÅ@¡CµM¦Ó¡A¦b¦h¼Æªº²Õ´¤¤¡AIPCIªº»ù­È¬O¥¼©w¸qªº¯S¼x¡A¥B¥¼©w¸qªº°ÝÃD¨ã¦³µL­­ªº¸Ñ¨M¤è¦¡---¥]§t³\¦hÆF¥©ªº¡B»ª¦ü¯u¹êªº¤Î¿ù»~ªº¤è¦¡¡C¦pªG¸Ó¤½¥q±ý¦¨¥\«OÅ@¨ä¸ê²£¡A«hÃѧO¡B½LÂI¡B»{ÃÒ¡BºÊ±±©M«OÅ@IPCIªº¹Lµ{(process of identification, inventory, qualification, monitoring and protecting)»Ý­n°]°È»P¸gÀç¡Bª÷¿Ä¡Bªk«ß©M¬ì§Þ³¡ªù¤§¶¡¨ó½Õ¤@­Pªº§V¤O¡C