SP1 Chapter 2
SP1 Chapter 2
SP1 Chapter 2
CHAPTER 2: INTELLECTUAL
PROPERTY RIGHT
Intellectual property rights are the legal rights that cover the privileges
given to individuals who are the owners and inventors of a work, and have
created something with their intellectual creativity. Individuals related to areas
such as literature, music, invention, etc., can be granted such rights, which
can then be used in the business practices by them.
The creator/inventor gets exclusive rights against any misuse or use of work
without his/her prior information. However, the rights are granted for a limited
period of time to maintain equilibrium.
The following list of activities which are covered by the intellectual property
rights are laid down by the World Intellectual Property Organization (WIPO) −
Industrial designs
Scientific discoveries
Protection against unfair competition
Literary, artistic, and scientific works
Inventions in all fields of human endeavor
Performances of performing artists, phonograms, and broadcasts
Trademarks, service marks, commercial names, and designations
All other rights resulting from intellectual activity in the industrial,
scientific, literary, or artistic fields
1
MODULE SOCIAL AND PROFESSIONAL ISSUES-SP1
Copyright
Patent
Patent
Trade Secrets, etc.
2
MODULE SOCIAL AND PROFESSIONAL ISSUES-SP1
3
MODULE SOCIAL AND PROFESSIONAL ISSUES-SP1
4
MODULE SOCIAL AND PROFESSIONAL ISSUES-SP1
Comparison of Attacks
The following table shows the Comparison of Attack Categories against
Desired Cyber Ecosystem Capabilities −
5
MODULE SOCIAL AND PROFESSIONAL ISSUES-SP1
Case Study
The following diagram was prepared by Guilbert Gates for The New York
Times, which shows how an Iranian plant was hacked through the internet.
6
MODULE SOCIAL AND PROFESSIONAL ISSUES-SP1
7
MODULE SOCIAL AND PROFESSIONAL ISSUES-SP1
Types of Attacks
The following table describes the attack categories −
data-leakage attacks
injection attacks and abuse of functionality
spoofing
time-state attacks
buffer and data structure attacks
resource manipulation
stolen credentials usage
backdoors
8
MODULE SOCIAL AND PROFESSIONAL ISSUES-SP1
9
MODULE SOCIAL AND PROFESSIONAL ISSUES-SP1
network investigation
10
MODULE SOCIAL AND PROFESSIONAL ISSUES-SP1
standards
guidelines
practices
These parameters help the owners and operators of critical infrastructure to
manage cybersecurity-related risks.
11
MODULE SOCIAL AND PROFESSIONAL ISSUES-SP1
12
MODULE SOCIAL AND PROFESSIONAL ISSUES-SP1
End-to-End Measures
It is a medium for transporting Protocol Data Units (PDUs) in a protected
manner from source to destination in such a way that disruption of any of
their communication links does not violate security.
Association-Oriented Measures
Association-oriented measures are a modified set of end-to-end measures
that protect every association individually.
Data Encryption
It defines some general features of conventional ciphers and the recently
developed class of public-key ciphers. It encodes information in a way that
only the authorized personnel can decrypt them.
13
MODULE SOCIAL AND PROFESSIONAL ISSUES-SP1
14
MODULE SOCIAL AND PROFESSIONAL ISSUES-SP1
For more knowledge about this topic, please check the link provided
https://www.youtube.com/watch?v=UqZJPuyK9VY
15
MODULE SOCIAL AND PROFESSIONAL ISSUES-SP1
16