此篇文章发布距今已超过45天,您需要注意文章的内容或图片是否可用!
本课程由纽约州立大学布法罗分校教授Shambhu J. Upadhyaya讲授。
3.5 保护知识产权免受威胁
[MUSIC] In Lesson 4, we looked at the Cloud Computing paradigm and the associated security issues. Obviously, the DMD process will generate an enormous amount of data. The data package generated by DMD will contain sensitive information and intellectual property.在第4课中,我们学习了云计算模式相关的安全问题。显然,DMD过程将产生大量的数据。DMD生成的数据包将包含敏感信息知识产权。 Details on how to protect IP from malicious insiders and outsiders will be discussed in this lesson.Intellectual Property or IP refers to an invention or a product or some industrial design which has significant commercial value and is copyrighted by a person or an organization.关于如何保护知识产权免受恶意内部人员侵害的详细信息本课将讨论局外人。知识产权是指一项发明或一种产品一些具有重大商业价值的工业设计版权归个人或组织所有。 Intellectual Property rights are like any other property right. They allow creators or owners of patents, trademarks or copyrighted works to benefit from their own work or investment in their creation.There are several important reasons for the need of IP security.知识产权和其他产权一样。它们允许专利、商标或受版权保护的作品从他们自己的作品或对他们创作的投资中获益。对知识产权安全的需求有几个重要原因。 First, IP promotes the invention of new work in technology and culture for the betterment of human life.Second, the legal protection of new inventions helps getting investments for additional resources for further research.Third, the promotion and protection of IP boosts economic growth, creates new industries and job opportunities, and enhances the quality of life.首先,知识产权促进新技术作品的发明改善人类生活的文化。第二,新发明的法律保护有助于为进一步的研究获得额外的资源投资。第三,促进和保护知识产权可以刺激经济增长,创造新的行业和就业机会,并提高生活质量。 Given the value of intellectual property, it is always subject to threats of various kinds. Let us look at two distinct threats. The first one, a generic threat, and the second one, relevant to DMD.First, Piracy, this is a generic threat. Illegal access to copyrighted material is one of the most concerning issues in IP security.Though there have been various cases of copyrighted piracy reported in international intellectual property association,there have been only minor actions taken to protect such infringement.鉴于知识产权的价值,它总是受到各种各样的威胁。让我们看看两种不同的威胁。第一个是一般性威胁,第二个与DMD相关。首先是盗版,这是一个普遍的威胁。非法访问受版权保护的材料知识产权安全中最受关注的问题之一。尽管有各种各样的盗版案件国际知识产权协会报道,只采取了一些小的行动来保护这种侵权行为。 One example of piracy came into light in Hong Kong where a $10 DVD includes Windows 95, Office Professional, Microsoft Project, Norton Antivirus, and many other copyrighted software. The market cost of all those software was actually more than $4,000.Second, Trusted IC chips threat.This threat is relevant to DMD.一个盗版的例子出现在香港一张10美元的DVD包含Windows 95,Office Professional、Microsoft Project、诺顿防病毒软件和许多其他受版权保护的软件。所有这些软件的市场成本实际上超过4000美元。第二,可信IC芯片的威胁。这个威胁与DMD有关。 Globalization has resulted in the rapid development of computer chip production in countries such as China, Taiwan, and Singapore, but it has resulted in new kinds of threat as well. Outsourcing of IC chip manufacturing give rise to new threats including IC design theft, illegal copying, and so on. Also IC's are vulnerable to malware and Trojan circuitry, which can lead to data leaks once the circuit is in use.全球化导致了计算机芯片生产的快速发展在中国、台湾和新加坡,但是它也导致了新的威胁。集成电路芯片制造外包引发新的威胁包括IC设计盗窃、非法复制等等。IC也容易受到恶意软件和木马电路的攻击,一旦电路被使用,这可能导致数据泄露。 Let us now see how intellectual properties can be protected.The evolution of technology brings new challenges for IP protection. Technical protection services, also known as TPS, is a mechanism that defines policies to assist in controlling the distribution of digital intellectual property on the internet.现在让我们看看如何保护知识产权。技术的发展给知识产权保护带来了新的挑战。技术保护服务,也称为TPS,是一种定义策略以帮助控制的机制数字知识产权在互联网上的分布。 TPS suggests a set of technical protection mechanisms to protect IP. This includes, one, Integrity, defines access privileges of a system or a file by different users including owner, user, organization and distributor.Two, Rights Management Languages.This defines the rights and responsibilities of owners, distributors and users, enabling the computer to determine whether requested actions fall within the permitted range.TPS提出了一套保护知识产权的技术保护机制。这包括,第一,正直,定义不同用户对系统或文件的访问权限包括所有者、用户、组织和经销商。二、权限管理语言。这界定了所有者的权利和责任,分销商和用户,使计算机能够确定请求的操作是否在允许的范围内。 Three, Encryption.This allows sharing of files or data over the Internet such that it can be accessed only by legitimate users with valid encryption decryption keys. Four, Persistent Encryption. It allows the consumer to use information while the system maintains it in an encrypted form so that it cannot be shared with other systems with no legitimate key.三、加密。这允许在互联网上共享文件或数据只有拥有有效加密解密密钥的合法用户才能访问。四、持久加密。它允许消费者在使用信息的同时系统以加密的形式保存它没有合法的密钥就不能与其他系统共享。 Five, Watermarking.It embeds information, for example a work ownership, into a digital work in much the same way that paper can carry a watermark.A digital watermark can help owners track copying and distribution of digital works. While the previously described attack and defense cases represent threats coming from outside, threats to IP can also exist within an organization.五、水印。它嵌入信息,例如作品所有权,就像纸张可以携带水印一样。数字水印可以帮助所有者跟踪数字作品的复制和发行。虽然前面描述的攻击和防御案例代表了即将到来的威胁从外部来看,对IP的威胁也可能存在于组织内部。 This is the case of insider threat.Internal Attack refers to security breaches by an authorized personnel.Such breaches are hard to detect because these employees have credentials for authorized log in, know the network architecture and system security policies, which are mainly designed to protect from outsider attacks.这是内部威胁的情况。内部攻击是指授权人员违反安全。这种违规行为很难被发现,因为这些员工拥有授权登录,了解网络架构和系统安全策略,主要用于防止外部攻击。 There are mainly two reasons for such attacks. One, employees' personal benefit. Two, grievance against the organization.Here is an example of an insider threat.In 2008 a noteworthy insider attack occurred when Terry Childs, a network engineer for the San Francisco Department of Telecommunications and Information Services, alter the city's network passwords, locking FiberWAN access for 12 days.Childs was found guilty of felony of network tampering.这种攻击主要有两个原因。一、员工个人利益。第二,对组织的不满。这是一个内部威胁的例子。2008年发生了一次值得注意的内部攻击,旧金山电信部的网络工程师信息服务,修改城市网络密码,封锁FiberWAN入口12天。查尔兹被判网络篡改重罪。 The work required to regain system control cost the city of San Fransisco $900,000, and 60% of city services were affected by the insider attack.To restrict such attacks, organizations can follow the following guidelines.Thorough background check of employees, Monitor employee activities on organization's systems, Restrictive access to sensitive information, Monitor organization's network and security systems to detect anomalies or suspicious activities.重新获得系统控制所需的工作花费了旧金山市90万美元,60%的城市服务受到了内部攻击的影响。为了限制此类攻击,组织可以遵循以下准则。对员工进行彻底的背景调查,监控员工在组织系统上的活动,限制性访问敏感信息,监控组织的网络和检测异常或可疑活动的安全系统。 In conclusion, IP threat is real and one should safeguard the IP against attacks coming from outside as well as from inside. Setting up proper access control within organizations, encrypting the sensitive data, and having cyber activity monitoring tools in place to detect intrusive behaviors are good mitigation strategies. Cyber espionage, also called advanced persistent threat to IP is quite common these days. But it will require new strategies to combat, and it is, outside the scope of this course.总之,知识产权威胁是真实的,我们应该保护知识产权抵御来自外部和内部的攻击。在组织内设置适当的访问控制,加密敏感数据,并部署网络活动监控工具检测侵入行为是很好的缓解策略。网络间谍,也称为对IP的高级持续威胁,目前相当普遍。但是这需要新的策略来对抗,超出了本课程的范围。https://www.coursera.org/learn/cyber-security-manufacturing推荐站内搜索:最好用的开发软件、免费开源系统、渗透测试工具云盘下载、最新渗透测试资料、最新黑客工具下载……
宙飒天下网-ZhouSa.com
还没有评论,来说两句吧...