Subdecks (1)

Cards (29)

  • defined as “the ownership of ideas and control over the tangible or virtual representation of those ideas. Use of another person’s intellectual property may or may not involve royalty payments or permission, but should always include proper credit to the source.” These can be trade secrets, copyrights, trademarks, and patents
    Intellectual Property
  • Unlawful use or duplication of software-based intellectual property. It is also the most common IP breach.
    Software piracy
  • a window that usually pops up during the installation of new software. This is the most common tool used to establish that the user has read and agrees to the license agreement.
    License agreement
  • Another effort to combat piracy. Individuals who install software are often asked or even required to register their software to obtain technical support or the use of all features.
    Online registration process
  • ____ ____ ____ occur when an individual or group designs and deploys software to attack a system.
    Deliberate Software Attacks
  • software components or programs designed to damage, destroy, or deny service to the target systems.
    Malicious code