3. Let’s mute our microphones
Please post your questions on the chat window.
We will try to answer few of them in the time period…
.. Rest our team will get back to you later
Some Housekeeping before we start…
4. Why IPR and cyberspace linkage is important and why it is needed
now?
Few Case Studies
IPR Awareness
- Patents
- Copyrights
- Trade secrets
Learning Outcomes
5. Read the link- 5 minutes
https://indiankanoon.org/doc/1741869/
https://www.wipo.int/amc/en/news/2020/cybersquatting_covid19.html
Discuss
– Trademark Issues In Cyber Space
A domain name dispute arises when more than one individual believe
that they have the right to register a specific domain name. It arises
when a registered trademark is registered by another individual or
organization who is not the owner of trademark that is registered. All
domain name registrars must follow the ICANN's policy .Cybersquatting
is a type of domain name dispute. Cybersquatting is done when domain
names are registered, sold or trafficked-in with the intention to make
profit from the goodwill of someone else. It is a punishable act.
– Passing Off
Yahoo!, Inc. vs Akash Arora & Anr. on 19 February, 1999
6. Read the link- 5 minutes
https://www.oppedahl.com/ac/complain.htm
https://www.netlitigation.com/netlitigation/cases/oppedahl.htm
Discuss
– Meta-tagging Issues In Cyber Space
Meta tagging is a technique in which a word is inserted in the keywords
field of the site to increase the chances of a search engine returning the
site, even though the site may have nothing to do with the word which
was inserted. Infringement of trademark occurs when companies
include their own websites meta tags containing the names or
descriptions of other companies.
Oppedahl & Larson v. Advanced Concepts
7. Read the link- 5 minutes
http://www.internetlibrary.com/cases/lib_case60.cfm
https://www.netlitigation.com/netlitigation/cases/shetland.htm
Discuss
– The Shetland News's deep link to embedded pages of the Shetland
Times's web site, through the use of Times' web site's news headlines,
was held to be an act of copyright infringement under British law and an
injunction was issued for the same.
Shetland Times Ltd. v. Dr. Jonathan Wills and Zetnews Ltd.
8. Read the link- 5 minutes
https://onlinelaw.wustl.edu/blog/case-study-am-records-inc-v-napster-inc/
https://www.copyright.gov/fair-use/summaries/a&mrecords-napster-
9thcir2001.pdf
Discuss
– The infringement of copyright protection online is known as digital piracy, which involves the
uploading, streaming, downloading and sharing of copyrighted works (e.g., books, music, and films)
beyond authorization for access, use and distribution prescribed by law. A case in point was Napster,
an online platform that enabled the illegal distribution of music through peer-to-peer file sharing ( A&M
Records, Inc. v. Napster, Inc., 2001). Copyright infringement also occurred on other peer-to-peer file
sharing and Torrent sites (such as Kazaa, Limewire, and PirateBay), and cryptolockers (i.e., sites that
provide cloud storage and sharing services to clients; e.g., Megaupload) (Drath, 2012). Like other
forms of cyber-enabled intellectual property crime, digital piracy deprives the authors and publishers of
copyrighted works of economic returns on their creations, property and labour. For example, HBO (a
US channel network that requires viewers to pay to view content) experienced millions of dollars in lost
US revenue when episodes of one of its TV series, Game of Thrones, were leaked online for free
viewing (Denham, 2015).Scripts of Game of Thrones' episodes and the unaired episodes of the HBO
TV shows were also leaked online following a data breach that HBO experienced in 2017 (Gibbs,
2017).
digital piracy
12. 12
www.ipadventure.in
Slides designed by the team. I am distant associate for
this startup. Slides will be made available on slideshare:
IPR and PATENTS Day #...
19. Original Ideas, research Results
A book or a novel protected by copyright
Copyright need not be registered
WIPO ( World Intellectual Property Organisation)
patents, copyrights, trademarks, geographical indications, designs
IP- Intellectual Property
20. GI- Darjiling Tea
Adidas Shoe- Aesthestics plus functionality- No need to register
Disney Character - register
Trademarks- Logos
Patent duration – 20 years from the date of application
IP- Intellectual Property
21.
22. Cyberwarfare refers to the use of digital attacks
– like computer viruses and hacking
– by one country to disrupt the vital computer systems of another, with
the aim of creating damage, death and destruction.
Future wars will see hackers using computer code to attack an enemy's
infrastructure, fighting alongside troops using conventional weapons like
guns and missiles
Threatmap: https://threatmap.checkpoint.com/
Cyber Warfare
27. Ethical Hacking
– Ethical hacking is used by cyber practitioners to find vulnerabilities
before an attacker is able to exploit them.
Cyber Kill Chain Model
– Describes Phases of Targeted Cyber Attacks
– 7 Steps : Reconnaissance, Weaponization, Delivery, Exploit,
Installation, Command and Control, and Actions on Objectives
Ethical Hacking and Cyber Kill Chain
28. Risk Evaluation to enterprise from array of vulnerabilities
Prevent breaches once Malware is analyzed
Ransomware
– type of malicious software (malware) used by cybercriminals to extort
money.
WannaCry (Locker Ransomware)
– takes your data hostage, promising to return it if you pay a ransom.
– Attack took place in May 2017 for Microsoft OS systems
– The WannaCry ransomware attack hit around 230,000 computers
globally.
Malware Analysis and Vulnerability Assessment
35. Almost all of the pictures or texts that are shared from unknown sources
from friends are created for advertising purposes and harvest of the
likeprofiles. The objective of social farming sites is to bring traffic to their
page and target viewers’ and their friends digital and demographic
profiles
avoid adding their like, share or comment on a text or picture that comes
from friends who last shared the content and were not the originator
Social Media
36.
37. In 1981, he was charged with stealing computer manuals from Pacific
Bell. In 1982, he hacked the North American Defense Command
(NORAD), an achievement that inspired the 1983 film War Games
In 1989, he hacked Digital Equipment Corporation's (DEC) network and
made copies of their software
Because DEC was a leading computer manufacturer at the time, this act put
Mitnick on the map. He was later arrested, convicted and sent to prison. During
his conditional release, he hacked Pacific Bell's voicemail systems.
https://www.linkedin.com/in/kevinmitnick/
Kevin Mitnick
38. cybercrime- credit cards etc, cyber industrial espionage and cyber
warfare
black hat and white hat hackers, darkweb
Teenage, thrill, validation, adrenalin rush, power, idealism
heightened sense of social injustice- hacktivist collectives like Anonymous
Hackers Mindset
39.
40. Hello there. My handle is 5NIP3R but the gang calls me 5R. I can’t remember when I got
into computers for the first time or when my addiction to the internet started. What I am sure
of is that during high school I found my inner hacker calling. Talking to other hackers in the
deep web, working to impress one another, made me realise the endless doors internet and
data can open. Knowledge is power, and the power is online. Although I started with small
hits, I built my experience through the years and decided to take it a step further.
I did my studies in Behavioural Psychology. Understanding behaviours and patterns always
fascinated me. All that time, all my effort, paid off. Now, I consider myself a gentle master
hacker. People give hints about their lives all over the web; you just have to be patient,
curious and perseverant. Data that people see as meaningless happens to be gold when
analysed together. I’ll tell you a story about my most recent successful corporate hacking,
and how I pulled it off.
Inside the mind of a hacker
41. I am a freelancer. I work here and there and I’m a hacker for amusement.
It makes me feel a bit like a superhero too. When I don’t like a brand or a
person, I hack them, I take revenge.
The choice of target came by chance last time. I paid a multinational
company for a bundled service, and they ended up not presenting the
final product I was expecting, refusing to return the money I invested. So I
did what any good hacker would do. I returned home and suited up.
Inside the mind of a hacker