Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Protecting Intellectual Property: Copyright Laws, Watermarks, and E-commerce Security, Slides of Fundamentals of E-Commerce

An overview of protecting intellectual property (ip) in the digital age. It discusses the challenges of enforcing copyright laws, methods for protecting digital ip such as digital copyright laws, electronically locking files, and digital watermarks. The document also covers e-commerce security, focusing on client security, communication channel security, and server security. Additionally, it explores the concepts of secrecy and privacy, cookies, anonymous browsing, and various types of client threats such as viruses, worms, and trojan horse programs.

Typology: Slides

2012/2013

Uploaded on 07/30/2013

shoki_sho
shoki_sho 🇮🇳

4.8

(8)

139 documents

1 / 10

Toggle sidebar

Related documents


Partial preview of the text

Download Protecting Intellectual Property: Copyright Laws, Watermarks, and E-commerce Security and more Slides Fundamentals of E-Commerce in PDF only on Docsity! Protecting copyrights and IP • Enforcing existing copyright laws can be difficult. • Some methods for protecting digital IP include: – Digital copyright laws – Electronically locking files – Digital watermarks Docsity.com Digital watermarks • Steganography is the practice of hiding information within other information. Example: “See everyone? Lucky Larry!” What does it mean? • Example of conventional watermark: $20 bill • A digital watermark is a digital code or stream embedded into a file. They do not affect the quality of the file and may be undetectable. • The presence of a watermark can indicate that the file was stolen. Docsity.com Cookies • Cookies are files that store identifying information about clients for the purposes of personalization. See The Cookie FAQ for more information. • Malicious programs can read cookies to gain private information. Many sites do not store sensitive data in cookies. • Cookies are not inherently bad, but it is wise to learn about them. Software exists that enables you to identify, manage, display, and eliminate cookies. See Cookie Crusher, and Cookie Pal. Docsity.com Anonymous browsing • Since many Web sites gather information about visitors to their sites, you are constantly giving away information such as your IP address. • There are portals that allow you to surf the Web anonymously by visiting their portal first. • Their site acts as a firewall, preventing any leaks in information. • Example: Anonymizer.com Docsity.com Client threats • Malicious code is a program that causes damage to a system. • Malicious code can affect both the server and the client. Typically servers engage in much more thorough detection and disinfection. • Examples:  Virus or worm  Trojan horses  Malicious mobile code in active content Docsity.com
Docsity logo



Copyright © 2024 Ladybird Srl - Via Leonardo da Vinci 16, 10126, Torino, Italy - VAT 10816460017 - All rights reserved