Security + Exam Guide (Charles River Media Networking/Security)

 < Day Day Up > 


A computer or network security-related book would not be complete without a chapter that specifically focuses on computer-related law, ethics, fraud, computer crimes, and investigation. Although it is probable that you will only face general questions regarding law, ethics, investigation, and computer crimes, it is important for you to understand these topics in order to have a well-rounded foundation as a security specialist. It is also important that you have the ability to answer even the general questions on the Security+ exam. In Chapter 6, you were introduced to some of the topics that are also included in this chapter to better prepare you for the subject matter contained in it. Remember, the most important information pertaining to the exam will be identified for you.

Law

As you are probably aware, similar to the topic of security, the topic of law and legal affairs covers a very broad range of subjects and information. In order to understand the laws that are relevant to computer-related crimes and prepare you for the subject matter later in this section, it is important for you to understand the legal terms that are described next.

Note 

Several current security-related certification exams refer to these terms as intellectual properties. Just for the record, intellectual properties can include subjects such as software piracy, trademarks, copyrights, patents and patent infringements, and trade secrets. However, before we discuss the intellectual properties, it is important for you to have a general understanding of the major types of laws that exist. They are listed as follows:

Next, we will discuss trademarks, patents, copyrights, and trade secrets.

Note 

It is likely that the Security+ exam will expect you to know the difference between trademarks, patents, copyrights, and trade secrets.

Trademark

A trademark is a word, phrase, title, logo, symbol, design, letter, number, or other object that it used to uniquely identify a company, product or service. Just about anything you can buy today has a trademark. Computers, software, network appliances, and even ISPs use registered trademarks. A registered trademark is trademark that has been granted for a particular product or service by the federal government. If another person or company creates a product or service and places a label or title on that product or service that is very similar to a registered trademark, the trademark's registered owner can possibly sue that individual or company.

Patent

A patent is a privilege or right of use that is specifically assigned by government to the creator, developer, or owner of a process, mechanism, service, or product. When something is patented, it is protected by law from being copied or misused by anyone other than the patent holder. In simple terms, if you develop a product and receive a patent from the U.S. Government Patent Office regarding that product, you have exclusive use of manufacturing and reproducing that particular product.

Copyright

A copyright is the right to create and sell what is exclusive to the creator or owner of the copyright. Copyrights are usually associated with such creations as books, articles, movies, and music. For example, an author can be the creator or inventor of an idea or expression. The author or publisher of the idea or expression will typically have the material registered and copyrighted in order to protect the idea or expression from being modified, copied or sold by someone else. In order to obtain a copyright, one must register for the copyright with the federal copyright registry.

Trade Secret

A trade secret is confidential company or business information or devices such as a secret formula, code, database, device, or other product whose effectiveness and profitability are based on its secrecy. In other words, in order for a company to have or maintain an advantage over a competitor, its trade secrets or company secrets must not be divulged.

Note 

For the exam, know that a trade secret is proprietary company information whose secrecy is essential to the health and profitability of a company.

Computer Laws

As mentioned in the opening paragraph of this chapter, there are specific laws that have been enacted which relate to the protection of computer security and privacy. The demand for more secure electronic business transactions and the need for increased protection regarding personal privacy are on the rise. More computer-related security laws and stricter punishment, for those who break them, are needed to protect the privacy and welfare of businesses and individuals in this highly technical age.

There are many new computer privacy laws currently being considered by government. Next, you will be provided with a list of valid security and privacy laws. It is not likely that the Security+ exam will expect you to know them all. However, you never know what CompTIA might have in store as the exam popularity grows and different questions are added to the exam. Look closely at the following laws, you will notice they are relative and apply to many of the topics discussed in this book:

If you are interested in learning about the newest computer-related laws including copyright, trademark, and other legislation, you should definitely visit http://www.complaw.com. Additional legal information and resources can be found at http://www.findlaw.com and http://www.usdoj.gov/criminal/cybercrime/cclaws.html.


 < Day Day Up > 

Категории