CYBER security notes unit-5
CYBER security notes unit-5
Cyber attacks can come in the form of viruses, malware, email phishing,
social media fraud - the spectrum of cyber threats is limitless. We are
more interconnected than ever before, but for all of the advantages, that
connectivity leaves us vulnerable to the risks of fraud, theft, abuse, and
attack. Cybercrime can have wide-ranging impacts, at the individual,
local, state, and national levels.
Cyberattacks can come in the form of viruses, malware, email phishing, social media fraud
- the spectrum of cyber threats is limitless. We are more interconnected than ever before,
but for all of the advantages, that connectivity leaves us vulnerable to the risks of fraud,
theft, abuse, and attack. Cybercrime can have wide- ranging impacts, at the individual,
local, state, and national levels.
Organized cybercrime, state-sponsored hackers, and cyber espionage can pose
national security risks to our country and our critical infrastructure.
Transportation, power, and other services may be disrupted by large scale
cyber incidents. The extent of the disruption is highly uncertain as it will be
determined by many unknown factors such as the target and size of the incident.
Vulnerability to data breach and loss increases if an organization's network
is compromised. Information about a company, its employees, and its customers
can be at risk.
Individually-owned devices such as computers, tablets, mobile phones, and
gaming systems that connect to the Internet are vulnerable to intrusion. Personal
information may be at risk without proper security.
In common use, property is simply ‘one’s own thing’ and refers to the relationship
between individuals and the objects which they see as being their own to
dispensewith as they see fit. Scholars in the social sciences frequently conceive of
property asa ‘bundle of rights and obligations’. They stress that property is not a
relationship between people and things, but a
Traditionally, that bundle of rights includes: z control use of the property z benefit
from the property (e. g.: mining rights and rent) z transfer or selling of the property
z exclude others from the property Intellectual Property Protection in Cyberspace
.
The term intellectual property reflects the idea that this subject matter is the product
of the mind or the intellect, and that intellectual property rights may be protected at
law in the same way as any other form of property. Intellectual property laws are
territorial such that the registration or enforcement of IP rights must be pursued
separately in each jurisdiction of interest.
However, these laws are becoming increasingly harmonised through the effects of
international treaties such as the Berne Convention, Paris Convention and WTO
Agreement on TradeRelated Aspects of Intellectual Property Rights. Intellectual
property laws confer a bundle of exclusive rights in relation to the particular form
or manner in which ideas or information are expressed or manifested, and not in
relation to the ideas or conceptsthemselves.
The term “intellectual property” denotes the specific legal rights which authors,
inventors and other IP holders may hold and exercise, and not the intellectual
work itself. Intellectual property laws are designed to protect different forms of
intangible subject matter, although in some cases there is a degree of overlap. Like
other forms of property, intellectual property (or rather the exclusive rights which
subsist in the IP) can be transferred or licensed to third parties. There are various
kinds of tools of protection that come under the umbrella term ‘intellectual
property’. Important among these are the following: z Patents z Trademarks z
Geographical Indications z Layout Designs of Integrated Circuits z Trade Secrets z
Copyrights z Industrial Designs Out of this tool kitty mainly it is copyright and
trademark which are of relevance when we discuss intellectual property protection
in cyberspace. Before proceeding to discuss the exact application of IP laws and
their implication in cyberspace, it becomes imperative to know in some greater
detail about them.
After reading this unit, you should be able to: z explain the term intellectual
property; z describe the basic concept of copyright and the rights included in the
term copyright; z explain infringement of copyright and what are the remedies; z
explain the concept of trademark the rights of trademark and remedies for their
search; and z describe the challenges faced by IPR in cyberspace.
Intellectual Property in Cyberspace. Basic Concept Copyright is a right given by
law to the creators of literary, dramatic, musical and artistic works and producers of
cinematograph films and sound recordings to do or authorize the doing of certain
acts with regard to their creations. It is a kind of protection against unauthorized
use or misuse of a work, but for a
limited duration.
The Copyright Act classifies the works in which copyright subsists in India
in to the following three classes:
The scope of ‘literary work’ includes any “work which is expressed in print or
writing, irrespective of the question whether the quality or style is high”. It also
includes computer programs and computer databases. Dramatic work includes any
piece for recitation, choreographic work or entertainment in dumb show, the scenic
arrangement or acting, form of which is fixed in writing or otherwise but does not
include a cinematograph film. Musical work means a work consisting of music and
includes any graphical notation of such work but does not include any words or any
action intended to be sung, spoken or performed with the music. Artistic work means
a painting, a sculpture, a drawing (including a diagram, map, chart or plan), an
engraving or a photograph, whether or not any such workpossesses artistic quality; a
work of architecture; and any other work of artistic craftsmanship.
The Copyright Act defines cinematograph film as “any work of visual recording
on any medium produced through a process from which a moving image may be
produced by any means and, includes a sound recording accompanying such visual
recording”. Sound recording (phonogram) is a recording of sounds from which
sounds can be produced regardless of the medium on which such recording is
made or the method by which the sounds are produced. Please answer the
following Self Assessment Question. Self Assessment Question 1 Spend 2 Min.
Copyright is governed by Act.
Intellectual Property Protection in Cyberspace 8 8.3.2 Rights Included in the term
‘Copyright’ Copyright is a bundle of rights and this bundle can be broadly
classified into two categories, viz. economic rights and moral rights. Economic
rights are so called because “they imply as a rule that within the limitations set by
the copyright law the owner of the copyright may make all public use of the work
conditional on payment of remuneration”.
These rights enable the copyright owner to reap economic returns for his work.
The major economic rights available in the Indian copyright Act are the following:
(a) Right of Reproduction
(b) Right to Issue Copies of a Work
(c) Rights of Public Performance
(d) Right of Communication to the Public
(e) Adaptation Right
(f) Translation Right Right of reproduction is the most fundamental of all
economic rights. The right envisages that copyright owner has the exclusive right
to authorize the making of one or more copies of a work or of a substantial part of
it in any material form, including sound and visual recording. The most common
kind of reproduction is printing an edition of a book. Storing of a work in any
medium by electronic means is also reproduction. The Copyright Act gives the right
of reproduction in all classes of works. Moral Rights are generally provided with a
view to assert the authorship on a work and also to uphold the right of integrity. The
Indian Copyright Act provides this as special rights of authors to claim authorship
of the work and to restrain or claim damages in respect of any distortion,
mutilation, modification or other act in relation to the said work which is done
before the expiration of the term of copyright if such distortion, mutilation,
modification or otheract would be prejudicial to his honour or reputation. Moral
rights are independent of the economic rights and remain with the author even after
he has transferred his economic rights. In the era of digital technologies, moral
rights, particularly right of integrity, are very necessary to safeguard against misuse
and distortion of an author’s work.
Copyright, being a property right, can be transferred or assigned to another person.
It can also be inherited during the time it exists. Without transferring or assigning, a
copyright owner can license specified uses by others. 8.3.3 Infringement of
Copyright and Remedies Thereof Any copying or duplication, adaptation,
translation, public performance, communication to the public or broadcast done
without the authorization of the copyright owner, or even where any work has been
licensed or assigned, any violation of the conditions of the licence or assignment
constitutes copyright infringement. Any import of infringing copies also constitutes
copyright infringement. Even such copies made outside India cannot be imported
into India without infringing copyright where such copies, if made in India, would
infringe copyright, even if it may not be an infringement in the country of origin.
Since copyright is a proprietary right, the owner has to administer his own
rights. The Copyright Act provides for collective Intellectual Property in
Cyberspace 9 administration of rights through registered copyright societies.
These societies have to be formed voluntarily by the copyright owners. Only the
owner of copyright or the society who have the rights can institute civil and
criminal proceedings against infringement of his works. Civil remedies include
injunction, and damages.
Copyright infringement is also a cognizable offence. Copyright infringement is
punishable with imprisonment for a term ranging from six months to three years
and with a fine ranging from Rs. 50,000 to Rs. Two lakh. District Courts have
been given jurisdiction to try the suits relating to copyright violation within the
vicinity of which the owner of the copyright resides or carries on business. 8.3.4
Limitations/Exceptions to Copyright The rights granted by copyright are
exclusive in nature. This exclusivity is sometimes criticized as monopoly in favour
of the right owners.
Therefore, in order to balance these opposing private and public interests the
legislature provides the remedy in the form of drawing limitations/exceptions to
copyright. This is achieved by two means; firstly, limiting the duration in which a
work enjoys copyright protection, and secondly, allowing
certain uses without specific authorization by the owner of copyrights, known as fair use
provisions in copyright parlance. Copyright is an intellectual property right and like all other
intellectual property rights it is for a limited duration.
This limitation emanates from the basic concept of intellectual property right that
while creators of intellectual property have the right to control the reproduction
and other uses of their works, they being essential elements in the scientific and
cultural progress of humanity, the society has the right to access and share the
same so that social and cultural life of humanity gets enriched.
While the Berne Convention provides for a minimum period of protection which is
life term of the author plus 50 years thereafter, national governments are free to
provide a longer term of protection. In India, original literary, dramatic, musical and
artistic works enjoy copyright protection for the lifetime of the author plus 60 years
if they are published within the lifetime of the author.
Many types of exploitation of a copyrighted work which are for social purposes
such as education, religious ceremonies, and so on are exempted from the operation
of the rights granted in the Act. For example, playing music at religious
ceremonies, including marriage processions and marriage festivities, official
functions of central and state governments and local bodies will not be affected
bycopyright.
This is done in keeping with the social and cultural traditions of the country. 8.3.5
Registration of Copyright The Copyright Act provides for registration of works.
However, the registration under the Act is voluntary and not obligatory. Registration
does not itself confer copyright but the particulars entered in the Register of Copyright
maintained inthe Copyright Office constitute prima facie evidence of ownership of
copyright in copyright cases. As per the provisions of the Act, copyright subsists in any
work as soon as it is created, without any formality like registration being observed.
8.3.6 International Nature ofCopyright Protection Copyrights are national in nature.
This means that your rights are recognised by your national laws and extend to
the territorial limits of your country. However, international treaties like the
Berne Convention for the Protection of Literary and Artistic Works Intellectual
Property Protection in Cyberspace 10 (1886) the Universal Copyright
Convention (1952) and the Agreement on Trade Related Aspects of Intellectual
Property Rights (1994) ensure protection of copyrights of nationals of a member
country in all other member countries. Through the principle of ‘National
Treatment’ it is ensured that foreigners if they are nationals of a membercountry,
are given the same rights enjoyed by the nationals, except in the matter of term of
protection.
India is part of the international copyright regime through its membership of Berne
Convention for the Protection of Literary and Artistic Works, Convention
Establishing the
We saw that the ‘good life’ is what ethical action seeks to protect and promote.
We’ll say more later about the ‘good life’ and why we are ethically obligated to
care about the lives of others beyond ourselves. But for now, we can define an
ethical issue as ‘important’ or ‘significant’ when its associated harms or benefits
have a substantial possibility of making a difference to certain individuals’ chances
of having a good life, or the chances of a group to live well: that is, to
flourish in society together. Some harms and benefits are not ethically significant.
Say I prefer Coke to Pepsi. If I ask for a Coke and you hand me a Pepsi, even if I am
disappointed, you haven’t impacted my life in any ethically significant way. Some
harms and benefits are too trivial to make a meaningful difference to how our life
goes. Also, ethics implies human choice; a harm that is done to me by a wild tiger or
a bolt of lightning might be very significant, but won’t be ethically significant, for
it’s unreasonable to expect a tiger or a bolt of lightning to take my life or welfare
into account.3 In many technical contexts, such as the engineering, manufacture, and
use of aeronautics, nuclear power containment structures, surgical devices,
buildings, and bridges, it is very easy to see the ethically significant harms that can
come from poor technical choices, and very easy to see the ethically significant
benefits of choosing to follow the best technical practices known to us.
All of these contexts present obvious issues of ‘life or death’ in practice; innocent
people will die if we disregard public welfare and act negligently or irresponsibly,
and people will generally enjoy better lives if we do things right. Because ‘doing
things right’ in these contexts preserves or even enhances the opportunities that
other people have to enjoy a good life, good technical practice in such contexts is
also ethical practice. A civil engineer who willfully or recklessly ignores a bridge
design specification, resulting in the later collapse of said bridge and the deaths of a
dozen people, is not just bad at his or her job. Such an engineer is also guilty of an
ethical failure—and this would be true even if they just so happened to be shielded
from legal, professional, or community punishment for the collapse.
In the context of cybersecurity practice, the potential harms and benefits are no less
real or ethically significant, up to and including matters of life and death. But due to
the fact that cybersecurity efforts are often carried out ‘behind the scenes,’ largely
hidden away from customers, clients, and other users, the ethical nature of
cybersecurity practice can be harder to recognize. This part of the module seeks to
make these issues more visible.
Alok (name changed on request) is in his early teens, not the age when he should be
making thousands of dollars. Alok is a hacker who lives on the dangerous by-
lanes of the internet— the dark web. Accessible only through browsers designed to
promote anonymity and confuse law enforcement, the dark web is where the
nefarious elements of the internet hang out. The baby- faced Alok has been
working with a hacker collective on the dark web for nearly three years now. In
those three years, he has been party to several instances of theft and trading,
particularly of credit card information, on the dark web and its marketplaces. He
was never a leader, but one of the foot soldiers, yet he managed to earn bitcoins that
are now worth thousands of dollars. Alok hides his wealth from his parents.
These days, Alok is in the throes of a moral crisis. It may have paid him well, but he
is not sure if he wants to continue being what those in the security business calls a
black hat hacker—someone who uses his skills for negative, often illegal ends. As
he grows up, Alok is going through the realization of his own power and of the ways
in which he can use it.
Meet the hackerIf the mental picture that lights up in your mind when you hear of
Alok the hacker is of a young, bespectacled guy sitting in a dark room, with his face
lit up by the bluish glow of his computer monitor, you are not too far away from
reality. That’s where the journey of most hackers start—staying up in the middle of
the night, trying different things, finding and learning new waysto manipulate
code and find vulnerabilities.
Like Alok, somewhere along the way, they see a fork on the road, one that could take
them towards using their power to make code dance to their tunes for the good, the
other that takes them to the direction where they could wreak havoc. It’s 2017 and
coding is power and exceptional coders have an inordinate amount of power. Efforts
to target cyber installations of ISIS is just one such example.
For most people, the hacker is a mysterious being. There is so little that the person on
the street knows about these digital lock-pickers and much of the little they do know
has been influenced by how the hacker is portrayed in popular culture.
The term hacker itself has become more complicated over the years. Its usage—
alternating between black hat and white hat (the good guys)—means that the meaning
oscillates between something of an outlaw in the Wild West of the internet while at the
same time conjuring up images of the sheriff of the town as well.
The Hacker mind Why do hackers, well, hack? It often starts with a need for thrills, for
validation. It is not always the money on offer that attracts them to turn rogue; it is a
need for the adrenalin rush that comes from breaking impenetrable defences and
proving themselves to other hackers. According to several coders I have met, that
moment of triumph of knowing of their own power, is something of a crucial rite of
passage.
Alok, the young hacker, remembers his first hack, finding a vulnerability in how a
startup in Bangalore stored user data and getting a T-shirt as swag from the company
after he reached out to them and warned them about it. The sense of idealism and an
overwhelming
belief in the power of technology to set right the ills of the society is real and drives
many young coders. Hackers tend to havean acute, heightened sense of what is right
and what is wrong, and much of their behaviour is based ..
That is what, in particular, leads to the formation of hacktivist collectives like
Anonymous which tries to correct what theyclaim are social or injusticesHackers will
exert huge influence over our lives as we move towards an even more connected
world. Civil society and governments need to invest in understanding them and trying
to channelise their power in making the world a better place.