Q. Write the differences between the following —


(a) Copyrights and Patents

(b) Plagiarism and Copyright infringement

(c) Non-ethical hacking and Ethical hacking

(d) Active and Passive footprints

(e) Free software and Free and open source software


Answer :-

(a)
Copyrights:-
• Copyright grants legal rights to creators for their original works like writing, photograph, audio recordings, video, sculptures, architectural works, computer software, and other creative works like literary and artistic work.
• The rights include right to copy (reproduce) a work, right to create derivative works based upon it, right to distribute copies of the work to the public, and right to publicly display or perform the work.
• It prevents others from copying, using or selling the work.

Patents:-
• A patent is usually granted for inventions. Unlike copyright, the inventor needs to apply (file) for patenting the invention. When a patent is granted, the owner gets an exclusive right to prevent others from using, selling, or distributing the protected invention.
• Patent gives full control to the patentee to decide whether or how the invention can be used by others. Thus it encourages inventors to share their scientific or technological findings with others.
•  A patent protects an invention for 20 years, after which it can be freely used. Recognition and/or financial benefit foster the right environment, and provide motivation for more creativity and innovation.

(b)
Plagiarism:-
• Presenting someone else’s idea or work as one’s own idea or work is called plagiarism.
• If we copy some contents from Internet, but do not mention the source or the original creator, then it is considered as an act of plagiarism.
• If someone derives an idea or a product from an already existing idea or product, but instead presents it as a new idea, then also it is plagiarism.
• If we take contents that are open for public use, we should cite the author or source to avoid plagiarism.

Copyright infringement:-
• Copyright infringement is when we use other person’s work without obtaining their permission to use or we have not paid for it, if it is being sold.
• Anything is on the Internet, does not mean that it is free for use.

(c)
Non-ethical hacking:-
• A non-ethical hacker is the one who tries to gain unauthorized access to computers or networks in order to steal sensitive data with the intent to damage or bring down systems.
• They are called black hat hackers or crackers.
• Their primary focus is on security cracking and data stealing.
• They use their skill for illegal or malicious purposes. Such hackers try to break through system securities for identity theft, monetary gain, to bring a competitor or rival site down, to leak sensitive information, etc.

Ethical hacking:-
• Hacking, when done with a positive intent, is called ethical hacking.
• Such ethical hackers are known as white hat hackers.
• They are specialists in exploring any vulnerability or loophole by during testing of the software. Thus, they help in improving the security of a software.
• An ethical hacker may exploit a website in order to discover its security loopholes or vulnerabilities. He then reports his findings to the website owner.
• Ethical hacking is actually preparing the owner against any cyber attack.


(d)
Active footprints:-
Active digital footprints which includes data that we intentionally submit online. This would include emails we write, or responses or posts we make on different websites or mobile Apps, etc.

Passive footprints:-
The digital data trail we leave online unintentionally is called passive digital footprints. This includes the data generated when we visit a website, use a mobile App, browse Internet, etc.

(e)
Free software:-
• Freedom to run program for any purpose.
• Freedom to study about program.
• Freedom to distribute copies of software.
• Freedom to modify/improve program and release improvements to public.

Free and open source software:-
• It has distribution of license.
• Availability of source code.
• Free distribution.
• Integrity of Authors Source Code.

Post a Comment

You can help us by Clicking on ads. ^_^
Please do not send spam comment : )

Previous Post Next Post