StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Illegal Software Use - Essay Example

Cite this document
Summary
In the modern research regarding the software piracy states that The Business Software Alliance has some interesting findings…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.6% of users find it useful
Illegal Software Use
Read Text Preview

Extract of sample "Illegal Software Use"

?Illegal Software Use In the modern research regarding the software piracy s that The Business Software Alliance has some interesting findings. The survey is conducted and the results revealed that around Fifty-seven percent of software users are using pirated software once in a life and around thirty one percent users confess using it always. The 2011 BSA Global Software Piracy Study reveals that the “Business decision-makers who admit they frequently pirate software are more than twice as likely as other computer users to say they buy software for one computer but then install it on additional machines in their offices,”. The latest study reveals that a number of security breaches come by known hackers. On this numerous reports including patches and software updates are presented. Moreover, a questioned is asked for the presence of relationship between unlicensed software and the perseverance of software is maintained or not? In this regard the CEO Robert Holleyman, president BSA says, “It can be a security issue.” Furthermore, he states that there is a major cultural problem that leads towards using pirated software and other security breaches. However, in any organization the security lapse can also happen due to mismanagement of its software and licensing. The unlicensed and not properly documented software are more prone to provided insufficient support to the organization. According to the Holleyman, the BSA report is founded over the IDC market data. The term “gold standard” is stated by the Hollyman that supports the sales of PC and software in worldwide markets (GNC Articles. 2012). This information is collected and published by Ipsos Public Affairs. The survey is held between 14,700 individuals that belong to 33 countries therefore representing around 80 percent of the worldwide software market (GNC Articles. 2012). The survey results came up with some astonishing facts. Around forty two percent of individuals had installed he pirated version of software that cost around $63.4 billion (GNC Articles. 2012). However, this cost cannot be claimed as the net loss due to the unknown budget of legal or illegal installed software as mentioned by BSA in the software industry. In the United States, the rate of pirated software is about nineteen percentages because it is considered as the most law-abiding country percentage-wise. In fact, for the big illegal software shares in the U.S. market the estimated net worth is approximately around $9.8 billion value. In the second place is China (GNC Articles. 2012). It is said that the country pirates an approximated 77 percent of its software. In addition, this software is of worth about $8.9 billion that stands China in the second place of illegal software after United States. The computer users in China pay out on typical just $8.89 for the legal software and in the United States this figure is around $127 for every computer. According to the BSA these cost figures for the software organizations are representing risk to U.S. economic well-being. This is due to the unwarranted aggressive advantage that is given to the industries thus encouraging them to use the pirated software. Likewise, even at the rate of 19 percent software piracy in the United States poses a major threat to the Information and Communication Technology in the United States (GNC Articles. 2012). Firstly, applications or software coming from a non-genuine source can be infected with viruses, malicious codes, Trojan horse, root kits etc. this imposes a direct threat or risks. For instance, if an operation system has been acquired from a non-genuine source, viruses can be installed with the operating system. Likewise, one cannot trust software provided by the vendor and it should be tested before implementing in a live or operational environment of a bank or financial institution. These fixes can be later on patched by security updates. In case of pirated software, update options are turned off due to the fear of Operating system validation tools from the manufacturers. Once the tool detects a non-genuine product, it starts the timer of locking down the operating system within a month. There is no prominent security breach that may have injected within the network from a cracked operating system but again it can exploit from that single point. Microsoft that is one of the leading software giants in the market generated a warning to its customers for buying counterfeit operation systems and application. Likewise, a study that is conducted recently demonstrated that the software available in the black market is already loaded by viruses, rootkits, malicious codes, Trojans and small spywares. Moreover, one more study steered by the Microsoft team of forensic study demonstrated that 63% of pirated software and operation systems were identified and the most number of percentages was calculated from the South Asia region. Likewise, the countries that were involved in the purchase and selling of this pirated software include Vietnam, Malaysia, Philippines and Indonesia. Moreover, Microsoft also concluded that the risk of bots, cracking of passwords, hijacks and backdoors along with Trojans was found in about 2000 instances. The study demonstrated that using pirated software poses many risks to the consumers personal or PII (Personal Identifiable Information) data at first. As the director of the region Asia – Pacific along with Japan said that using a genuine product is more secure as compare to an illegal and pirated copy of operation system, as it is one time purchase. The updates for the Windows have been reportedly hinder or rerouted. This is revealed when the 77 percent of the computers are investigated. The updates are routed towards the third party thus increasing the risk of security threats for instance malicious cyber-attacks, virus infections and hacking. According to the Dhakad, “Counterfeiters have started replacing original software in computers with used, malware-infected drives containing non-genuine or unlicensed software”. The cyber hackers are always ready to take advantage from the pirated software. Moreover, they are also ready to get profit from the transaction of new hard drives that can also be sold individually at a premium. In order to generate illegal advantage the cyber hackers can utilize a number of activities for instance theft of bank customers along with credit card number theft, false proposals and e-mail spams. However, these actions are carried out on the order of organized, for-profit illegal enterprises. A research conducted by the Business Software Alliance stated that that Philippines is currently on top 3 of the list demonstrating top most 20 countries containing an uppermost software piracy percentage. Deployment of firewall cannot protect the network, as risks are associated with both internal and external network. In order to protect the network, dimensions are created in terms of physical security, operating system security, database security and network security. Physical security is associated with rules and procedures to be followed by the users. For instance, if an organization has the policy to configure password for a screen saver, every employee must follow, although these are the basics but need to be followed. Moreover, the data servers must have a backup server on some other physical location that is replicated (GNC Articles. 2012). The operating system security must define rules and procedures for employees to update antivirus regularly, security patches, and any other software patch that the network administrator has just shared for probable vulnerabilities. Moreover, employees should scan the system occasionally or during their lunchtime to avoid security breaches. In order to provide database security, organization must complete all the required stages before making it operational. The stages include design, development and propagation of policies and procedures. The three critical parameters that are associated with database include integrity, availability, and data. Furthermore, the discretionary and access control is also essential as it restricts and allows specific users to access the database ("Curriculum development related to information security policies and procedures "). For incorporating strict policies and procedures to ensure network security and information assets, implementation of IDS is recommended as it sense unusual activities on the network. It is defined by (Cannon 2011) as “Network-based intrusion detection system (NIDS) refers to an intrusion detection system (IDS) that monitors activity on a network, instead of a particular host”. The NIDS will listen to all network activities instead of restricting for just one host. Moreover, disabling USB ports from the employee workstations can also secure the network from viruses and Trojans that came along with the flash drives (GNC Articles. 2012). Conclusion We have selected three different articles on software piracy and its use in the market. After a brief introduction on the topic our first article demonstrates the loss of revenue that is huge in numbers to the software industry. The second article demonstrated vulnerabilities associated with the information systems operating on a cracked operation system. The second article also demonstrates all risks, embedded along with preloaded rootkits, spywares, viruses and malicious codes. The third article talks about the associated risks along with preventions and techniques such as patch management, firewall implementation, Intrusion detection systems etc. References CANNON, D.L., 2011. CISA Certified Information Systems Auditor Study Guide. Wiley. GNC Articles. 2012. Surprise: 57 percent admit to using pirated software. [ONLINE] Available at: http://gcn.com/articles/2012/05/15/cybereye-57-percent-use-pirated-software.aspx. [Accessed 10 December 13]. Microsoft Corporation. 2012. BSA Report Finds 61 Percent PC software theft in Egypt totals $172 million in 2011. [ONLINE] Available at: http://www.microsoft.com/middleeast/press/Pages/Article.aspx?id=898. [Accessed 10 December 13]. Market Wired. 2006. Lack of a Patch Management Solution Can Cost You Big Bucks. [ONLINE] Available at: http://gcn.com/articles/2012/05/15/cybereye-57-percent-use-pirated-software.aspx. [Accessed 10 December 13]. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Illegal Software Use Essay Example | Topics and Well Written Essays - 1250 words”, n.d.)
Retrieved from https://studentshare.org/information-technology/1495863-what-is-the-professionals-position-in-using
(Illegal Software Use Essay Example | Topics and Well Written Essays - 1250 Words)
https://studentshare.org/information-technology/1495863-what-is-the-professionals-position-in-using.
“Illegal Software Use Essay Example | Topics and Well Written Essays - 1250 Words”, n.d. https://studentshare.org/information-technology/1495863-what-is-the-professionals-position-in-using.
  • Cited: 0 times

CHECK THESE SAMPLES OF Illegal Software Use

Why Software Piracy Should Be Legalized

Everyone should be aware of the legal implications of unauthorized software use, for instance, according to Copyright Act, illegal reproduction of any software leads to criminal penalties and even imprisonment.... Generally, software piracy can be defined as unauthorized use, copying, or reproduction of commercial software, without really paying for the content.... Generally, software piracy can be defined as unauthorized use, copying, or reproduction of commercial software, without really paying for the content....
3 Pages (750 words) Essay

Software Ethics

The use of an unlicensed copy of a software application is totally illegal and unethical.... Software Ethics and Legal use - A clean tech.... It is all about being honorable and to follow software ethics those are established through a set of moral rules/principles.... Without a doubt, copying software illegally is against the law as well… The software copyright rules defend software authors and developers, similarly as investors are protected by the patent law (National Academy of Engineering; Shelly, Cashman and Vermaat). In the same way, borrowing a licensed software ID # software Ethics software ethics is about the ethical compliance of the computer and software usage....
2 Pages (500 words) Essay

Nature of the Rights

ublic performances of the software: The creator has the right to authorize the use of the software for public performances like the exhibition of the product to new buyers or for non-profit academic purposes.... Software companies mostly engage in these public expositions of their software products to the public in order to reveal the maximum use of the product.... The software creator has the right to showcase his/her products on the Shopping Mall shelves or other stores where the public could have a glance at the software product, its logo, manuals and other vital information pertaining to its use....
7 Pages (1750 words) Case Study

Software Market and Piracy

The generation of Open Source Software against the commercial software has taken the software market by a raging storm, gaining popularity and taking down the use of commercial software's.... The use of the type of the software depends from the choice and task of the user.... The essay "software Market and Piracy" focuses on the majority interesting new occurrence that has developed in the software market, software with capability of being redistributed, modifications and access to source codes....
7 Pages (1750 words) Essay

Software Piracy Problem in the IT Industry

nline piracy is another type of illegal software distribution conducted by downloading illegal copies of software and distributing it to other online users.... Also, copying licensed software for friends to use is illegal.... This coursework "software Piracy Problem in the IT Industry" focuses on software piracy that is the illegal copying, downloading, sharing and installation of software that is copyrighted....
9 Pages (2250 words) Coursework

How Serious Is Software Piracy

Internet piracy is one way in which illegal software is sold.... For example in Net jargon, they use the term wares to refer to the pirated product.... From the paper "How Serious Is software Piracy " it is clear that the study on piracy covers a period between 2011 and 2013.... In 2011 software piracy was 42 percent and it jumps to 43 percent in 2013, the finding underscores the need to adopt a better way of managing software piracy....
5 Pages (1250 words) Essay

Issue of the Software Theft

nbsp;The company seeks to use various ethical theory and principle approaches to curb and stop the occurrence of the same case scenario.... The software that is produced is the real reason that a lot of the hardware that is in use functions as it does.... The paper considers the situation in which Primal Pictures company is faced with the problem of software pirating and illegal sharing on peer-to-peer download torrent sites.... hellip; The ethical theories and principles that are of consideration when it comes to the said software license violation are few and limited....
8 Pages (2000 words) Case Study

Ethics in Computer Software Design and Development

im Nindel-Edwards & Steinke (2008) posited that, lack of capital has pushed software developers to use illegal software.... Basically, issues lying beneath IT include provision of ethical duty and fulfilling end user's anticipation to use applications Ethical Dilemmas in Software Project ManagementEvery progress in IT is attached to at least one ethical uncertainty.... Basically, issues lying beneath IT include provision of ethical duty and fulfilling end user's anticipation to use applications responsibly....
6 Pages (1500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us