defined as “the ownership of ideas and control over the tangible or virtual representation of those ideas. Use of another person’s intellectual property may or may not involve royalty payments or permission, but should always include proper credit to the source.” These can be trade secrets, copyrights, trademarks, and patents
Intellectual Property
Unlawful use or duplication of software-based intellectual property. It is also the most common IP breach.
Software piracy
a window that usually pops up during the installation of new software. This is the most common tool used to establish that the user has read and agrees to the license agreement.
License agreement
Another effort to combat piracy. Individuals who install software are often asked or even required to register their software to obtain technical support or the use of all features.
Online registration process
____ ____ ____ occur when an individual or group designs and deploys software to attack a system.
Deliberate Software Attacks
software components or programs designed to damage, destroy, or deny service to the target systems.