sec - We are SMPTE · Virus damage $29 million Insider net abuse $28 million ... Broadband Gateway...
Transcript of sec - We are SMPTE · Virus damage $29 million Insider net abuse $28 million ... Broadband Gateway...
secsecEntertainment
& Media MarketsEntertainment Entertainment
& Media Markets& Media Markets
Protection Woes Are Well Known
ü“Love Bug” cost companies 6.7 billion dollars
üNapster – enough said
üStephen King’s “Riding the Bullet” rides for free
üViruses embed themselves in movie trailers
üNike site defaced
üStudents cheat by beaming test answers
to each other
Very Recent Happenings Raise More Worries
üWestern Union has credit and debit card data for 16,000 customers compromised
üIKEA - Hackers take personal data, customer addresses and phone numbers
üOPEC, the Organization of Petroleum Exporting Countries, has its Web site defaced by someone protesting high oil prices
New Technology Holes Found Every Day
WinCE Magazine, September 12, 2000:
“Two researchers testing Bluetooth devices discovered a flaw that allows users with personal digital assistants to eavesdrop on conversations…also found it possible to obtain the identity of the device and trace the user’s location.”
Big Losses Expected
Music and eBook industries will lose $45 billion by 2005 according to Forrester Research from loss of
content control
What, Us Worry?
NY Times, June 8, 2000:
“There are worries that what has happened to the pop music industry..with songs being swapped and pirated on the Internet beyond the reach of record company accountants..will happen with movies too if firm protections are not put in place first.”
•TV
•PC
•Cable Modem
•Set Top Box
•ISP
•Satellite Receiver
•Internet-to-Car Radio
•Car PC/TV
•Palm Top
•Wireless Phone
Multi-channel Program Distribution
Multi-channel Program Distribution Video/Audio On DemandVideo/Audio On Demand
Interactive GamingInteractive Gaming Home Shopping/Interactive
Advertising
Home Shopping/Interactive
Advertising
Bulletin BoardsBulletin BoardsDigital Content Production/StorageDigital Content Production/Storage
WebcastingWebcasting
Targeted Ad DeliveryTargeted Ad Delivery
Integrated Homes Are Connecting to Media & Entertainment Offerings in New Ways for New Services
Integrated Homes Are Connecting to Media & Entertainment Offerings in New Ways for New Services
Losses Mount
Theft of proprietary data $ 67 million
Financial fraud $ 56 million
Virus damage $29 million
Insider net abuse $28 million
Sabotage $27 million
CSI/FBI 2000 Computer Crime and Security Survey; Source: Computer Security Institute
Internet Protocol Distribution Creates Secure Connection Concerns
Internet Protocol Distribution Creates Secure Connection Concerns
Call ManagementCall Management
TV
•Adapter
•Modem
•ISDN/DSL
•Adapter
•Modem
•ISDN/DSL
2 Way Amplifier
2 Way Amplifier
Coaxial CableCoaxial Cable
Modem TerminationModem Termination
NodeNode
FiberFiber
Headend/RegionHeadend/Region
Broadband Gateway – Circuit Switched Networks
Broadband Gateway – Circuit Switched Networks
NetworksNetworks
To IP NetworkTo IP
Network
LocalLocal
LDLD
Increased Bandwidth = Lure To Wreak Havoc
üYAHOO - Denial of Service
üCD Universe – Held hostage
üIKEA and Western Union – customer data compromised
Assets At Risk
Cyber attackers can:
üDestroy an asset and its entire value
üCorrupt an asset thereby reducing its value
üDeny assets thus slowing service
üSteal an asset for personal gain
Other Concerns
üPrivacy Regulation Compliance
üOnsite Hacking and Data Theft
üCEOs Criminals?
üPartners
Digital Communication Configurations Create Security Needs
Digital Communication Configurations Create Security Needs
Service Distribution
Hub
Service Distribution
Hub
Service Distribution
Hub
Service Distribution
Hub
Service Distribution
Hub
Service Distribution
Hub
Service Distribution
Hub
Service Distribution
Hub
Regional HeadendRegional Headend
Service Distribution
Hub
Service Distribution
Hub
Telephony Carriers
Cable Companies
Studios
Interactive Multimedia
Services
Interactive Multimedia
Services
Technology Not A Panacea
üDon’t place reliance on purely technical solutions
üDon’t think of technology as the PANACEA
üMake sure content is usable with the protection provided
Consider the Business Model
Business Model Design Needs To Address Constituent Needs
ØEconomic viability
ØLegal uncertainty
ØFair use
ØTrademark and brand protection
ØEfficient rights management processing
ØAvailability
ØUsability
ØQuality
ØPrivacy
ØClear rights and usage limitations
Company Consumer
Is There Really A Threat?
√VCRs didn’t kill movies
√Grateful Dead go platinum
√Is it even worth protecting?
Don’t Panic!
Don’t REACT -- PROACT
For Your Consideration
üContent encryption
üPersistent encryption with just-in-time decryption
üAnchor content to a single machine/user
üWatermarking or digital time-stamping
üRights management
üAccess controls
Balance = Success
üSelect technical solutions carefully
üBlend solutions into an end-to-end protection system
üStrike a balance between technology, business models and legal protections
The Bad News
Ignoring Adequate Data and Content Protection
=
Potential Economic Loss
The Good News
Planning
=
Prevention and Growth
Take A Structured, Common Sense Approach
Report
Partner Review
Infrastructure ReviewBusiness Strategy Review
Privacy Protection
Protecting Brand andContent in the Digital Age