Page 203 - PYTHON-12
P. 203

9.  Defamation: It involves a cyber crime with the intent of lowering the dignity of someone by
                     hacking into their email account and sending mails using vulgar language to an unknown
                     person’s account.

               CTM: Cyber law defines all the legal and regulatory aspects of internet and the World Wide Web.

                10.  Assault by Threat: It refers  to threatening a person  or  his  family members  with dire
                     consequences through the use of a computer network, i.e., email, videos or phones.

                11.  Denial of Service (DoS) Attacks: A DoS attack is an attack by which legitimate users of a
                     computer are denied access or use of the resources of that computer. Generally, DoS attacks
                     do not allow the attacker to modify or access information on the computer. A DoS attack can
                     be of the following types:
                     •  Denial of Access to Information: Refers to an attack in which information sought by a
                        legitimate user is either destroyed or changed to some unsubtle form.

                     •  Denial of Access to Applications: Refers to an attack that denies a user from accessing
                        an  application  by making  it  either unusable  or unavailable.  This  is usually done to
                        prevent the user (or organization) from using applications to perform any task.

                     •  Denial of Access to Systems: Refers to the unavailability of the system, including all the
                        applications installed on the system or any data stored on the system.

                     •  Denial of Access to Communications: Refers to a common type of attack  that  can
                        range from cutting wires and jamming radio communications to flooding networks with
                        excessive traffic. An example of this type of attack is flooding a computer with junk mail.

              8.28 IPR ISSUES


              IPR stands for intellectual property rights which is the right to intangible property such as music,
              literature and artistic work created by a person. Intellectual property (IP) is a legal term that
              refers to creations of the mind. Intellectual property rights may be protected by patents, copyrights,
              industrial design rights, trademarks, trade dress and, in some jurisdictions, trade secrets. The owner
              of intellectual property is the person who has developed the product or the organization which has
              funded it. Safeguarding intellectual property from illegal use can be done by giving some exclusive
              rights to the owner of that property. These rights also promote creativity and dissemination and
              application of its result and encourage fair trading which helps in developing social and economic
              areas of a country.
              IPR-related  issues  in  India  like  patents,  trademarks,  copyrights,  designs  and  geographical
              indications are governed by the Patents Act, 1970 and Patent Rules, 2003, Trademarks Act, 1999
              and the Trademarks Rules, 2002, Indian Copyrights Act, 1957, Design Act, 2000 and Design Rules,
              2001, and the Geographical Indications of Goods (Registration & Protection) Act, 1999 and the
              Geographical Indications of Goods (Registration & Protection) Rules, 2002, respectively.
              Prevention from Security Threats
                                                                                                                  Computer Networks
              There are various methods to protect network threats. These protection methods are as follows:

                 1.  Authorization: Authorization means Intrusion Detection. Authorization means to grant
                     a person access to a network for legal use. It is an act of giving authority or legal identity
                     to a user to become an authorized user of the system. Authorization checks can also be
                                                                                                            8.49
   198   199   200   201   202   203   204   205   206   207   208