Rohit Sir Notes Unit 5 Cyber Security (BCC 401)
Rohit Sir Notes Unit 5 Cyber Security (BCC 401)
Patent-
Protects inventions that are novel, original, and distinct and that have an industrial value.
1. Patent Act 1970 governs patent filing and prosecution in India, and The Patent Rules
2003
2. Patent protects inventions
3. Patent protects an invention for 20 years
4. After 20 Years Patent cannot be renewed beyond that.
5. Patent application is INR 1600/- for an individual applicant.
6. Official Website Patent filing https://www.ipindia.gov.in
7. Patent can be filed either in Hindi or English.
8. Patent Head Office at Kolkata and its Branch Offices at New Delhi, Mumbai and
Chennai.
9. No age restriction for filing and application for patents
10. Patent application filing 80211 in2022-23
11. Top filing States Tamil Nadu, Maharashtra, Uttar Pradesh
Copy Right
It helps protect the creator of the original material so that no one can duplicate or use it
without authorization
1. Copy Right Act 1957 governs patent filing and prosecution in India.
2. Copy Right Head Office at Delhi.
3. Copy Right application filing 29466 in2022-23.
4. Copyright is the right of an owner of a work to control.
5. Copyright is the original works of authorship Such as software, dramatic,
musical, artistic, cinematograph films and sound recording.
6. Copy Right filling Life of Author+60-70 Years
7. Official Website Copy Right filing https://copyright.gov.in
8. No age restriction for filing and application for Copy Right.
9. Examples include downloading movies illegally and using copyrighted music without
permission.
Trademark
Trademark protects brands, logos, and slogans.
Trade secret
That includes formulas, practices, processes, designs, patterns, or compilations of
information that have inherent
Information Security programs are build around 3 objectives, commonly known as CIA –
Confidentiality,Integrity, Availability.
1 Confidentiality
2. Integrity
3.Availability.
CIA Triangle
The C.I.A. triangle - confidentiality, integrity, and availability - has expanded into a
morecomprehensive list of critical characteristics of information. At the heart of the
study of information security is the concept of policy. Policy, awareness, training,
education, and technology are vital concepts for the protection of information and for
keeping information systemsfrom danger.
Figure 1
Figure 2
• Facilitates data integrity, availability, and confidentiality – Effective information
security policies standardize rules and processes that protect against vectors
threatening data integrity, availability, and confidentiality.
• Protects sensitive data – Information security policies prioritize the protection of
intellectual property and sensitive data such as personally identifiable information
(PII).
• Minimizes the risk of security incidents – An information security policy helps
organizations define procedures for identifying and mitigating vulnerabilities and risks.
It also details quick responses to minimize damage during a security incident.
• Executes security programs across the organization – Information security policies
provide the framework for operationalizing procedures.
• Provides a clear security statement to third parties – Information security policies
summarize the organization’s security posture and explain how the organization
protects IT resources and assets. They facilitate quick response to third-party requests
for information by customers, partners, and auditors.
• Helps comply with regulatory requirements – Creating an information security policy
can help organizations identify security gaps related to regulatory requirements and
address them.
12 Elements of an Information Security Policy
A security policy can be as broad as you want it to be, from everything related to IT security
and the security of related physical assets, but enforceable in its full scope. The following list
offers some important considerations when developing an information security policy.
1. Purpose
2. Audience
3. Information security objectives
4. Authority and access control policy
5. Data classification
6. Data support and operations
7. Security awareness and behavior
8. Encryption policy
9. Data backup policy
10. Responsibilities, rights, and duties of personnel
11. System hardening benchmarks
12. References to regulations and compliance standards