DRM and trusted computing - Essay Example

Comments (0) Cite this document
This occurs when an authorized user causes network traffic between computers communication over the internet (Lockhart 2007, p. 84). As a…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER97% of users find it useful
DRM and trusted computing
Read TextPreview

Extract of sample "DRM and trusted computing"

DRM AND TRUSTED COMPUTING The setup in which trusted computing when used to enforce DRM is vulnerable to man in the middle attacks (MitM) because of the ARP spoofing. This occurs when an authorized user causes network traffic between computers communication over the internet (Lockhart 2007, p. 84). As a result, the trick user is able to monitor the data shared between the communicating victims. This is dangerous since it exposes confidential information to the trick user, which might lead to access to personal and important information (Reid & Caelli 2005, p. 127). This is because the attacker has the freedom to interrupt data frames on a system, adjust the traffic or discontinue all traffic (Luettmann & Bender 2009, p. 131-138).
Similarly, According to Reid & Caelli (2005, p. 128), trusted computing is vulnerable to MitM attack when used to enforce DRM if the attacker acts as a proxy between two communicating users. This affects the flow of information because it is distorted or manipulated to suit the interests of the attacker. Computers that use unencrypted networks are vulnerable to attacks by the man in the middle because their network traffic is easily grabbed (Luotonen 1998, p. 120).
In order to avoid the vulnerability of trusted computing to MitM attacks when enforcing DRM, it is advisable for communicating computers to use encrypted network connections. This may be offered by the Https technology that makes it tricky for an attacker to interfere with the network traffic (Reid & Caelli 2005, p. 129). The Https is efficient because of the safe sockets layer (SSL) facility that shields the web-based network interchange from unauthorized users. The Https also uses certificates that can prove the identity of the servers a computer is interacting with over the internet (Strebe 2006, p. 18-23).
List of References
Lockhart, A. (2007). Network security hacks. Beijing: OReilly.
Luettmann, B., & Bender, A. (2009). Man-in-the-middle attacks on auto-updating software. Bell
Labs Technical Journal, 3(2), 131-138.
Luotonen, A. (1998). Web proxy servers. Upper Saddle River, Nj: Prentice Hall.
Reid, J., & Caelli, W. (2005). “DRM, Trusted Computing and Operating System Architecture.”
Australian Computer Society, Inc., 44, 127-135.
Strebe, M. (2006). Network Security Foundations Technology Fundamentals for IT Success.
Hoboken, John Wiley & Sons. Read More
Cite this document
  • APA
  • MLA
(“DRM and trusted computing Essay Example | Topics and Well Written Essays - 250 words”, n.d.)
DRM and trusted computing Essay Example | Topics and Well Written Essays - 250 words. Retrieved from
(DRM and Trusted Computing Essay Example | Topics and Well Written Essays - 250 Words)
DRM and Trusted Computing Essay Example | Topics and Well Written Essays - 250 Words.
“DRM and Trusted Computing Essay Example | Topics and Well Written Essays - 250 Words”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF DRM and trusted computing

Trusted computing base / Business reasons for a BCP and a DRP

...? Number: Lecturer The concept of a “trusted computing base” Trusted computing base was first defined by as the combination of kernel and trusted process that allow violation of the systems access and control regulations (Rushby, 1981). Lampson further defined it as a small amount of software and hardware that security depends on and that we distinguish from a much larger amount that can misbehave without affecting security (B. Lampson, 1992). From these two definitions therefore, trusted computing base can be terminology in computer security meaning a set of all the components including hardware, software, procedures and all other relevant components that are critical and essential to enforcing the security of the entire system... . In...
2 Pages(500 words)Research Paper


...Many tools are available to monitor and control large IT projects. They are project selection and reselection, project scheduling, estimating, and budgeting, planning, project team management and selection, stakeholder management, management support, procurement management, learning and knowledge management, and risk management. Project selection and reselection is one of the tools in the monitoring and control of large IT projects. Although Yetton (2000) uses this as an indication of how successful projects have been monitored and controlled, several other scholars (Cai et al., p. 1-22) use it as an independent variable. Project selection is the procedure of approving or rejecting projects. Project benefits are weighted... tools are...
6 Pages(1500 words)Assignment


... ComputingComputability Theory The field of computer science deals with the idea of computability theory which looks at mathematical and logical problems by examining their solvability. In essence it examines if a problem can be positively handled by a logic machine or not. In even simpler terms, computability theory works at the very limits of computing power so while we can expect computers today to be very powerful and complex machines; there are certain limits to the problems they can solve. In certain situations, computability theory suggests that specialized computers might be...
9 Pages(2250 words)Essay

The Trusted Traveler Program

...Essay of my Choice This paper is about the “Trusted Traveler” Program that is making the rounds of the American airports at the moment. It studies the benefits of this program, its disadvantages as well as controversies and legal issues surrounding it. The "Trusted Traveler" Program came in to its own when it was proposed by the Association of Corporate Travel Executives which allowed the facility to frequent fliers as they could be bypassed from lengthy security lines and checks if they carried an l. D. card with them which would show that they have already undergone a federally approved background inquiry and inspection. The “Trusted Traveler" program in essence was made to facilitate the frequent flyers that could include all... the...
4 Pages(1000 words)Essay

Nokia Emerges as India's Most Trusted Brands

...provided its customers with equipment, solutions and services for communications networks through Nokia-Siemens networks. (Nokia emerges as Indias most trusted brands., 2010). With qualities like such, Nokia owes to have the highest brand equity among its consumers. Bottled water Nestle pure life, coca cola desani. Yogurt Nestle, Fage. Soup Knorr, Campbell’s soup. Mattresses Sealy, Simmons. Crayons Crayola, Picasso. Electric razors Braun, Panasonic. Ballpoint pens Parker, Faber castle. Computer manufacturer Sony Vaio, dell Toilet paper Cottonelle, Kleenex. Chicken Tyson, Wanchai Ferry. The reason that these brands are still in my memory is because of the strong and lasting image that they have built in...
2 Pages(500 words)Article


...; employed for voice communication as well as TV, correspondingly. Fiber optics based communication and transmission medium engages installing the entire new fiber optic cables, complete set of little fibers of glass, consequently DSL is possible to be the existing choice for the majority informal Internet clients intended for a number of periods (Hintzr, 2010; Nash, 2000; Shelly et al., 2005). 6.3- Equipment and Installation Together DSL, communication and transmission medium normally utilize a modem or else router to interface through computers as well as additional Internet devices. DSL as well necessitates that voice devices in the home areas be ended by diverse filters to stop their dawdling the fastest DSL...
12 Pages(3000 words)Essay


...The LZ encoding was developed in 1984 and has been identified as simple to implement due to its compatibility with hardware. Its purpose is to compress large English language documents. The encoding has been used in PDF files and allows the reduction of the size of a document. The compiler can be said to be a program used in the translation of computer language (Layton, 2007). It simplifies the original language of information into another language, normally easy to understand. An example of a compiler is the JAVA software. Applications software is a class of software used to perform a specified function. An office suite is an application used for editing written documents. Another example is a media player whose...
2 Pages(500 words)Coursework

The downside of trusted computing

...The downside of trusted computing College In spite of the many principles concerning the safety of trusted computing, the design has brought up some concerns over privacy and functionality. Practically, trusted computing utilizes cryptography to aid in enforcing a chosen behavior ("Weighing the pros and cons of the Trusted Computing Platform," n.d.). The major feature of trusted computing is to permit someone else to authenticate that only certified code runs on a system. Remember, trusted computing when used alone does not guard against...
1 Pages(250 words)Essay

Trusted computing and TPM-enhanced software

...on such a scale creates room for significant limitations and backlashes. The associated limitations result in major failures in the software of the computer system, which to my opinion is the cause of system failure. Numerous accusations exist, resulting in lack of trust in the system. Some of the associated failures include the accusation by Cambridge’s Ross Anderson that Trusted Computing is anticompetitive in its quest of locking users in the enforcement of DRM (Kim, 2009, p. 6). In my opinion, the invasion of privacy is among the failures of the system, for this reason limiting the success of Trusted Platform Module enhanced...
2 Pages(500 words)Essay

DRM: the basic framework and its motivation

... Lim, K., & Lee, C. (2013). A framework for unified digital evidence management in security convergence. Electron Commer Res, 13(3), 379-398. doi:10.1007/s10660-013-9119-y Mishra, D., & Mukhopadhyay, S. (2014). A privacy enabling content distribution framework for digital rights management. International Journal Of Trust Management In Computing And Communications, 2(1), 22. doi:10.1504/ijtmcc.2014.063271... DRM: the basic framework and its motivation By An ideal digital rights management system should beflexible and transparent to the user as well as being complex for the attackers to crack. The first generation of digital rights management aimed at controlling copying whereas the second generation scheme of...
2 Pages(500 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic DRM and trusted computing for FREE!

Contact Us