Module Social and Professional Issues
Module Social and Professional Issues
ACTIVITY 2
Copyright: Copyright is a legal right that grants exclusive control over the use and distribution of original literary,
artistic, musical, or dramatic works. It protects the expression of ideas rather than the ideas themselves. Copyright
provides creators with the right to reproduce, distribute, display, perform, and make derivative works based on
their original creations. It typically lasts for the life of the creator plus a specific period after their death.
Trademark: Trademarks are distinctive signs, symbols, names, logos, or designs that are used to identify and
distinguish goods or services of one company from those of others. They provide exclusive rights to the owner to
use and protect the registered mark in relation to specific goods or services. Trademarks help build brand
recognition and prevent others from using similar marks that may cause confusion among consumers. Patent:
Patents are granted for new inventions or innovations that offer new technical solutions to existing problems. They
provide exclusive rights to inventors to prevent others from making, using, selling, or importing their invention
without permission. Patents are granted for a limited period, usually 20 years from the filing date, in exchange for
disclosing the invention to the public.
Trade Secret: Trade secrets are confidential and valuable business information that provides a competitive
advantage. They can include formulas, processes, techniques, customer lists, or other proprietary information.
Unlike other forms of intellectual property, trade secrets are not publicly registered but are protected through
reasonable measures to maintain their secrecy. As long as the information remains confidential, the owner retains
exclusive rights.
Industrial Design: Industrial design rights protect the aesthetic and visual aspects of a product, such as its shape,
configuration, pattern, or ornamentation. They ensure that the unique appearance of a product is not copied or
imitated without permission. Industrial design rights provide exclusivity to the owner for a specific period, typically
ranging from 10 to 25 years, depending on the jurisdiction.
Geographical Indications: Geographical indications (GIs) are used to identify products originating from a specific
geographical region that possesses certain qualities, reputation, or characteristics attributable to its origin. GIs
protect traditional knowledge, cultural heritage, and quality standards associated with products from a particular
geographic area. They prevent unauthorized use of the geographical indication and promote fair trade and
consumer protection.
2. In the Types of attacks, choose only 2 of them and tell your insight about it. Phishing Attacks:
Phishing attacks are attempts to trick individuals into revealing sensitive information, such as login credentials,
credit card details, or personal information. These attacks typically occur through email, where the attacker poses
as a legitimate entity, such as a bank, a social media platform, or an online service provider. The emails often
include convincing messages and urgent requests, leading unsuspecting users to click on malicious links or provide
their confidential information.
Insight: Phishing attacks are a significant concern as they rely on social engineering techniques to exploit human
vulnerabilities. Attackers exploit people's trust and emotions, creating a sense of urgency or fear to prompt hasty
actions. It is crucial for individuals and organizations to be vigilant and cautious when dealing with unsolicited
emails, ensuring they verify the legitimacy of requests before sharing any sensitive information. Education and
awareness about phishing techniques can help users recognize and avoid falling victim to these attacks.
DDoS attacks aim to overwhelm a targeted system, network, or website with a flood of traffic from multiple
sources simultaneously. By overloading the target's resources, such as bandwidth or server capacity, DDoS attacks
disrupt or completely deny access to legitimate users. These attacks can be launched using a network of
compromised computers, known as a botnet, controlled by the attacker.
Insight: DDoS attacks pose a serious threat to online services and organizations, leading to service disruptions,
financial losses, and damage to reputation. The motive behind DDoS attacks can vary, including extortion, revenge,
or even as a distraction while carrying out other malicious activities. Mitigating DDoS attacks requires robust
network infrastructure, traffic monitoring systems, and proactive measures to detect and filter out malicious
traffic. Employing DDoS mitigation services or utilizing cloud-based protections can help organizations defend
against such attacks.
3. Why is it important to have strategies that will ensure the cyber security?
In today's digital age, organizations and individuals store and transmit vast amounts of sensitive information
online. This includes personal data, financial information, trade secrets, intellectual property, and more. Effective
cybersecurity strategies help protect this information from unauthorized access, theft, or misuse. By implementing
robust security measures, organizations can safeguard their valuable assets and maintain the trust of their
customers or users.
Cybersecurity breaches can result in significant financial losses for businesses and individuals. The cost of dealing
with the aftermath of a data breach or cyber attack can be substantial, including expenses related to incident
response, legal actions, customer notification, regulatory compliance, and reputational damage. Implementing
cybersecurity strategies helps mitigate the risk of financial losses associated with cyber incidents and reduces the
potential impact on business operations.
Many industries are subject to specific regulatory frameworks and data protection laws that require organizations
to implement appropriate cybersecurity measures. Non-compliance with these regulations can result in severe
penalties, legal consequences, and loss of business opportunities. By having cybersecurity strategies in place,
organizations can ensure compliance with relevant laws and regulations and avoid the associated risks.
Continuity of Operations:
Cybersecurity incidents, such as ransomware attacks or network breaches, can disrupt critical business operations,
leading to downtime, loss of productivity, and financial repercussions. Implementing cybersecurity strategies,
including robust incident response plans and backup and recovery procedures, helps organizations maintain the
continuity of their operations and minimize the impact of potential disruptions.
Cyber threats are constantly evolving, with attackers employing sophisticated techniques to exploit vulnerabilities.
Having cybersecurity strategies in place allows organizations to proactively identify and address emerging threats.
Regular risk assessments, vulnerability scanning, and security awareness training can help organizations stay ahead
of cyber threats and respond effectively to mitigate risks.