You are on page 1of 18

Compromises to

intellectual property (IP)

(Aina Syazwani)
Definition
the ownership of ideas and control over the tangible or
virtual representation of those ideas.

Use of another person's intellectual property may or may


not involve royalty payments or permission, but should
always include proper credit to the source.
The most common IP breach (pelanggaran) is the
unlawful use or duplication of software-based intellectual
property, more commonly known as software piracy.

If the user copies the program to another computer


without securing another license or transferring the
license, he or she has violated (mencabuli) the copyright.
In addition to the laws against software piracy, two
watchdog organizations investigate allegations of software
abuse :

Software & Information Industry Association (SIIA)


- formerly known as Software Publishers Association

Business Software Alliance (BSA)


Deliberate Acts of
Information Extortion

By nurul syafiqah
Attacker steals information from computer system and

demands compensation for its return or nondisclosure

Commonly done in credit card number theft


Extortion VS Blackmail

Extortion is often graded as a felony or a misdemeanor depending


on the amount of money or the value of the property or services
extorted from the victim

Blackmail is when the offender threatens to reveal


information about a victim or his family members that is potentially
embarrassing, socially damaging, or incriminating unless a
demand for money, property, or services is met
Codes Spaces case

It happen in June 2014

It was hit by a DDoS attack and then extorted by a hacker

The hacker hoped to get paid by the firm in exchange for


returning control to its operations
Fallout of Codes Space

Codes Space scurried to take back its account by


changing passwords
It was thwarted by the criminal, who had created backup
logins to the panel and started randomly deleting files
once he saw what the company was doing
In the end, the company claimed that "most of our data,
backups, machine configurations and offsite backups
were either partially or completely deleted."
The situation led the company to shut its doors.
DELIBERATE ACTS OF THEFT

( SYAHIRAH )
Illegal taking of anothers, electronic or intellectual
property.
2 types
i Physical Theft
ii Electronic theft
PHYSICAL THEFT

An adversary gains physical access to a system or device


through theft of the item.
Possession of a system or device enables a number of
unique attacks to be executed and often provides the
adversary with an extended timeframe for which to
perform an attack.
Most protections put in place to secure sensitive
information can be defeated when an adversary has
physical access and enough time
ELECTRONIC THEFT
Theft of laptop computers and small electronics.
Laptop computers and small electronics are highly
susceptible to theft because of their size and portability.
Disappear without any sign of forced entry.
More complex problem.
Forces of Nature
Maisarah
Forces of Nature

can disrupt not only the lives of individuals


but also the storage, transmission, and use of
information
Common Natural Threat

Fire Electrostatic discharge


Flood (ESD)
Earthquake Dust contamination
Lightning
Landslide
Tornado/Windstorm
Hurricane/Typhoon
Tsunami
Controls Implementation

prepare contingency plans for continued operations, such


as :
disaster recovery plans
business continuity plans
incident response plans.

You might also like