Professional Documents
Culture Documents
Uniti 10 Policy and Procedures
Uniti 10 Policy and Procedures
Uniti 10 Policy and Procedures
Phishing:
• This type of attack involves hackers sending malicious email
attachments or URLs to users to gain access to their accounts or
computer.
• Cybercriminals are becoming more established and many of these .
Users are tricked into emails claiming they need to change their
password or update their billing information, giving criminals access.
Hacking
• Hackers steal or guess passwords to get into individual user
accounts, or exploit security weaknesses to steal large amounts of
data from companies.
• Major data breaches occur often, with companies losing their
customers’ personal or financial information, often costing a
company millions of dollars.
Unauthorized access
• When a person gains entry to a computer network, system,
application software, data, or other resources without
permission.
• Any access to an information system or network that violates the
owner or operator's stated security policy is considered unauthorized
access.
Computer Crime Categories
• Computer as the target
• Computer As the Instrumentality of the Crime
• Computer Is Incidental to Other Crimes
• Crimes Associated With the Prevalence of Computers.
A trademark:
• Identifies the source of your goods or services.
• Provides legal protection for your brand.
• Helps you guard against counterfeiting and fraud.
Patent:
• A patent is a set of exclusive rights granted to an inventor or
assignee for a limited period (20 years) of time for any invention or
design.
• An invention is a solution to a specific technological problem and is
a product or a process.
• In basic terms, a patent allows the patent holder to stop others from
building his invention.
– Patent can be three types :
• Utility Patent
• Design Patent
• Plant Patent
Licensee
• A license is an agreement between two parties. The licensor allows
the licensee to do something (use the software, build an invention).
• In particular, a license may be issued by authorities, to allow an
activity that would otherwise be forbidden. It May require Paying a
fee and /or providing capability.
• Licensee Period for different organization is different:
Agreements:
• A negotiated and usually legally enforceable understanding between
two or more legally competent parties is called agreement.
• Although a binding contract can (and often does) result from an
agreement, an agreement typically documents the give and-take of a
negotiated settlement and a contract specifies the minimum
acceptable standard of performance.
• Product Keys
– Hardware Protection Like as Play station
Privacy protection:
• It also maintains the privacy of the end user so that they would be safe from being a victim of
cybercrime.
• Cyber laws design a secure platform and also a standard model for
the advancement of cyber security.
•
• In Nepal, cyber law is also known as ETA (Electronic Transaction Act)
which deals with issues related to cybercrime and also help in making
and implementing laws over cybercrime.
• Every organization needs to protect its data and also control how it
should be distributed both within and without the organizational
boundaries.
• These records are sensitive and cannot be shared, under penalty of law,
with any unauthorized recipient whether a real person or another
device.