Tuesday, August 13, 2019
DRM and trusted computing Essay Example | Topics and Well Written Essays - 250 words
DRM and trusted computing - Essay Example 131-138). Similarly, According to Reid & Caelli (2005, p. 128), trusted computing is vulnerable to MitM attack when used to enforce DRM if the attacker acts as a proxy between two communicating users. This affects the flow of information because it is distorted or manipulated to suit the interests of the attacker. Computers that use unencrypted networks are vulnerable to attacks by the man in the middle because their network traffic is easily grabbed (Luotonen 1998, p. 120). In order to avoid the vulnerability of trusted computing to MitM attacks when enforcing DRM, it is advisable for communicating computers to use encrypted network connections. This may be offered by the Https technology that makes it tricky for an attacker to interfere with the network traffic (Reid & Caelli 2005, p. 129). The Https is efficient because of the safe sockets layer (SSL) facility that shields the web-based network interchange from unauthorized users. The Https also uses certificates that can prove the identity of the servers a computer is interacting with over the internet (Strebe 2006, p.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.