StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

DRM and trusted computing - Essay Example

Cite this document
Summary
This occurs when an authorized user causes network traffic between computers communication over the internet (Lockhart 2007, p. 84). As a…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.7% of users find it useful
DRM and trusted computing
Read Text Preview

Extract of sample "DRM and trusted computing"

DRM AND TRUSTED COMPUTING The setup in which trusted computing when used to enforce DRM is vulnerable to man in the middle attacks (MitM) because of the ARP spoofing. This occurs when an authorized user causes network traffic between computers communication over the internet (Lockhart 2007, p. 84). As a result, the trick user is able to monitor the data shared between the communicating victims. This is dangerous since it exposes confidential information to the trick user, which might lead to access to personal and important information (Reid & Caelli 2005, p. 127). This is because the attacker has the freedom to interrupt data frames on a system, adjust the traffic or discontinue all traffic (Luettmann & Bender 2009, p. 131-138). Similarly, According to Reid & Caelli (2005, p. 128), trusted computing is vulnerable to MitM attack when used to enforce DRM if the attacker acts as a proxy between two communicating users.

This affects the flow of information because it is distorted or manipulated to suit the interests of the attacker. Computers that use unencrypted networks are vulnerable to attacks by the man in the middle because their network traffic is easily grabbed (Luotonen 1998, p. 120).In order to avoid the vulnerability of trusted computing to MitM attacks when enforcing DRM, it is advisable for communicating computers to use encrypted network connections. This may be offered by the Https technology that makes it tricky for an attacker to interfere with the network traffic (Reid & Caelli 2005, p. 129). The Https is efficient because of the safe sockets layer (SSL) facility that shields the web-based network interchange from unauthorized users.

The Https also uses certificates that can prove the identity of the servers a computer is interacting with over the internet (Strebe 2006, p. 18-23).List of ReferencesLockhart, A. (2007). Network security hacks. Beijing: OReilly. Print.Luettmann, B., & Bender, A. (2009). Man-in-the-middle attacks on auto-updating software. Bell Labs Technical Journal, 3(2), 131-138.Luotonen, A. (1998). Web proxy servers. Upper Saddle River, Nj: Prentice Hall. Print.Reid, J., & Caelli, W. (2005). “DRM, Trusted Computing and Operating System Architecture.

” Australian Computer Society, Inc., 44, 127-135. Strebe, M. (2006). Network Security Foundations Technology Fundamentals for IT Success. Hoboken, John Wiley & Sons.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“DRM and trusted computing Essay Example | Topics and Well Written Essays - 250 words”, n.d.)
DRM and trusted computing Essay Example | Topics and Well Written Essays - 250 words. Retrieved from https://studentshare.org/information-technology/1679251-drm-and-trusted-computing
(DRM and Trusted Computing Essay Example | Topics and Well Written Essays - 250 Words)
DRM and Trusted Computing Essay Example | Topics and Well Written Essays - 250 Words. https://studentshare.org/information-technology/1679251-drm-and-trusted-computing.
“DRM and Trusted Computing Essay Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/information-technology/1679251-drm-and-trusted-computing.
  • Cited: 0 times

CHECK THESE SAMPLES OF DRM and trusted computing

Main Functions of Middleware

Middleware is a type of software for hardwiring two otherwise separate applications together, allowing them to exchange data.... 'Webopedia' says that Middleware serve as the glue between applications because it is often used to integrate legacy components.... A typical enterprise solution is heterogeneous in nature....
3 Pages (750 words) Essay

Security Of Medical Records and Protected Health Information

“Recent news of data breaches involving the health information of celebrities like Farrah Fawcett, Britney Spears and Maria Shriver has cast a spotlight on the Health Insurance Portability and Accountability Act and the difficulties of keeping patient data secure in the… While you may be tempted to shrug off those high-profile cases — thinking, "That couldnt happen at my facility" — the reality is tens of thousands of patient records have been compromised so far this year, according to the Privacy Rights Clearing-house, in breaches Monaural stethoscope can be considered as the maiden application of technology in medicine, in less than two centuries technology has secured a commanding position in almost all specialties of medicine....
5 Pages (1250 words) Essay

Virtual Working Teams

The Communications Structure and Task Assignment For issues of cost reduction, cloud computing will be the majority of software support.... Peru is highly collectivist, in which decision-making is trusted and valued with group emphasis (geert-hofstede.... However, there must be an awareness of the cultural context in which the team is operating, understanding the different cultural… Mid-tier management on short term expatriate assignment, trained in cultural diversity related to these regions will be assigned to manage recruitment and training efforts....
2 Pages (500 words) Essay

Implementation of the Carlson SAN Approach

The paper “Implementation of the Carlson SAN Approach” will look at Carlson, one of the leading global groups of integrated organizations rendering hotel, travel, cruise, and marketing along with restaurant services.... The objective of the company is to attract the customers.... hellip; The author claims that Storage Area Network (SAN) system approach of Carlson can be prudently implemented to meet the growing demands of the people in the environment wherein they use cell phones and laptops to send emails with high data protection....
3 Pages (750 words) Essay

Gender in Public and Private

Similarly, they have a role of socializing individuals to become prominent members of the society and assume responsibilities without difficulties.... However, some of… For instance, public institutions such as religion, education, economy and government look upon weaker gender.... This means that gender is treated differently in the public Gender in Private and Public Sphere Social s are very important in shaping the way individuals behave in the society or their activities....
1 Pages (250 words) Essay

Trusted computing and TPM-enhanced software

The trusted computing Group, with the intention of providing safety for organizational data, started the company.... The trusted computing Group, with the intention of providing safety for organizational data, started the company.... Some of the associated failures include the accusation by Cambridge's Ross Anderson that trusted computing is anticompetitive in its quest of locking users in the enforcement of DRM (Kim, 2009, p.... As depicted in the paper, trusted computing has significant limitations despite its significance....
2 Pages (500 words) Essay

Threats of Online Management Systems

The paper will explore the problems the business is facing resulting from its growth, the business requirements, type of the system necessary to solve the problems, threats and solutions to the threats, and benefits of the use of information systems.... hellip; Running of businesses requires a lot of charisma and choice of the best methods in solving problems....
13 Pages (3250 words) Term Paper

Survey of Information Systems Personnel Theory

… The paper "Survey of IS Theory" is a wonderful example of an assignment on information technology.... Information Systems Personnel is responsible for the installation, maintenance, and management of computer software and hardware.... These tasks cover stand-alone and networked systems.... In addition to these duties, the development of the improvement of technological services also comes along....
12 Pages (3000 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us