Methods of protection against online raiding

The ever-increasing number of attacks on digital and intellectual assets and network nodes (known as raiding), has led to a need for a methodology to protect against online raiding.

In the course of scientific and practical work at the Information Security Institute, a definition of online raiding was formed - unfair dynamic disruptive actions aimed at the capture of communication systems, technological nodes, and/or appropriation of another’s identity in order to seize market share, engage in extortion or blackmail, or terminate the activities of a person or business.

The developed methodology is built primarily on a thorough understanding of such disciplines as law, cybersecurity, criminology, and Internet law. The methodology takes into account the practice of enforcement of international laws on the protection of copyright and laws on the protection of personal information.

The main international laws and conventions that are taken into account in the methodology are:

  • 1.  Berne Convention for the Protection of Literary and Artistic Works (BC)
  • 2.  Digital Millennium Copyright Act (DMCA)
  • 3.  EU General Data Protection Regulation (GDPR)
  • 4.  EU Directive on Copyright in the Digital Single Market
  • 5.  Copyright Act of 1976
  • 6.  Federal Trademark Dilution Act of 1995
  • 7.  Personal Information Protection and Electronic Documents Act (PIPEDA)
  • 8.  The Trade-Related Aspects of Intellectual Property Rights Agreement (TRIPS)
  • 9.  The Anti-Cybersquatting Consumer Protection Act (ACPA)
  • 10.  The Paris Convention for the Protection of Industrial Property (PC)
  • 11.  The Madrid Protocol for the International Registration of Trademarks
  • 12.  The Patent Cooperation Treaty (PCT)
  • 13.  The Hague Agreement Concerning the International Deposit of Industrial Designs
  • 14.  The WIPO Copyright Treaty (WCT)
  • 15.  The WIPO Performances and Phonograms Treaty (WPPT)
  • 16.  The EU Trademark Directive
  • 17. The EU Trade Secrets Directive
  • 18. The EU Cybersecurity Directive
  • 19. The EU General Data Protection Regulation
  • 20.  The EU Data Protection Directive

An in-depth understanding of the tools of Internet law allows us to effectively solve the problem of protecting intellectual assets from people using methods of unfair competition of various levels of radicalism. Integration of methods involves the creation of a special echeloned system of defense of intellectual digital assets in the network. Such a defense system greatly complicates attempts to attack digital assets and results in significant financial losses for the attacker instead of their accessing the assets. Accordingly, those who use unfair competition techniques to easily capture market share find themselves in a situation where it is financially unprofitable to attack such a defensive system.

The main effect of technological integration is a significant increase in the finances and time necessary to carry out active disruptive actions against a company’s or person’s digital assets.

The methodology of digital asset protection is multifunctional and allows a user to effectively neutralize competitors’ attacks at an early stage, heading off sudden blocking, hacking, and theft of accounts in social networks, attempts to steal patents and use of trademarks, and other methods of online raiding. The methodology also contains over 20 applications, check lists, regulations, and various legal schemes to restore access to temporarily lost digital assets.

Materials on the topic:

Event: ONLINE RAIDING: a form of business takeover in the 21st century
Event: How to protect your business from online theft and copying

Business solutions

Integrations

Форма для связи