Posts

Showing posts from August, 2018

Copyright, Trademark, Patent, or License? Understanding the Differences

Image
Copyrights, trademarks, patents, and licenses are each a different form of intellectual property (IP) rights protection recognized by U.S. law. The distinctions among them can be subtle and often the same product or service may involve more than one of these IP rights. How can you tell them apart when deciding how to  protect your company’s assets ? Here’s how. Copyrights Copyright  protects the rights of “authors” in their original creative works. Copyrightable works include artistic creations, like novels, paintings, films, and songs, but also business-related works like software code, website designs, architectural drawings, marketing reports, and product manuals. The author of a copyrighted work has the exclusive right to: Reproduce (print or copy), publish, perform, display, film and/or record the creative content. Create derivative works from the original work (for example, updates, revisions, summaries, translations, and adaptations). Copyright protection

Access Control Models - DAC, MAC, RBAC , Rule Based & ABAC

Image
Identity and Access Management is an extremely vital part of information security. An access control model is a framework which helps to manage the identity and the access management in the organization. There are 5 main types of access control models: discretionary, rule-based, role-based, attribute-based and mandatory access control model. Every model uses different methods to control how subjects access objects. While one may focus on rules, the other focus on roles of the subject. As a security professional, we must know all about these different access control models. While one company may choose to implement one of these models depending on their culture, there is no rule book which says that you cannot implement multiple models in your organization. These models are built into the core or the kernel of the different operating systems and possibly their supporting applications. Every operating system has a security kernel that enforces a reference monitor concept, whi