Page 203 - PYTHON-12
P. 203
9. Defamation: It involves a cyber crime with the intent of lowering the dignity of someone by
hacking into their email account and sending mails using vulgar language to an unknown
person’s account.
CTM: Cyber law defines all the legal and regulatory aspects of internet and the World Wide Web.
10. Assault by Threat: It refers to threatening a person or his family members with dire
consequences through the use of a computer network, i.e., email, videos or phones.
11. Denial of Service (DoS) Attacks: A DoS attack is an attack by which legitimate users of a
computer are denied access or use of the resources of that computer. Generally, DoS attacks
do not allow the attacker to modify or access information on the computer. A DoS attack can
be of the following types:
• Denial of Access to Information: Refers to an attack in which information sought by a
legitimate user is either destroyed or changed to some unsubtle form.
• Denial of Access to Applications: Refers to an attack that denies a user from accessing
an application by making it either unusable or unavailable. This is usually done to
prevent the user (or organization) from using applications to perform any task.
• Denial of Access to Systems: Refers to the unavailability of the system, including all the
applications installed on the system or any data stored on the system.
• Denial of Access to Communications: Refers to a common type of attack that can
range from cutting wires and jamming radio communications to flooding networks with
excessive traffic. An example of this type of attack is flooding a computer with junk mail.
8.28 IPR ISSUES
IPR stands for intellectual property rights which is the right to intangible property such as music,
literature and artistic work created by a person. Intellectual property (IP) is a legal term that
refers to creations of the mind. Intellectual property rights may be protected by patents, copyrights,
industrial design rights, trademarks, trade dress and, in some jurisdictions, trade secrets. The owner
of intellectual property is the person who has developed the product or the organization which has
funded it. Safeguarding intellectual property from illegal use can be done by giving some exclusive
rights to the owner of that property. These rights also promote creativity and dissemination and
application of its result and encourage fair trading which helps in developing social and economic
areas of a country.
IPR-related issues in India like patents, trademarks, copyrights, designs and geographical
indications are governed by the Patents Act, 1970 and Patent Rules, 2003, Trademarks Act, 1999
and the Trademarks Rules, 2002, Indian Copyrights Act, 1957, Design Act, 2000 and Design Rules,
2001, and the Geographical Indications of Goods (Registration & Protection) Act, 1999 and the
Geographical Indications of Goods (Registration & Protection) Rules, 2002, respectively.
Prevention from Security Threats
Computer Networks
There are various methods to protect network threats. These protection methods are as follows:
1. Authorization: Authorization means Intrusion Detection. Authorization means to grant
a person access to a network for legal use. It is an act of giving authority or legal identity
to a user to become an authorized user of the system. Authorization checks can also be
8.49