Thursday, June 20, 2019
DRM and trusted computing Essay Example | Topics and Well Written Essays - 250 words
DRM and trusted computing - Essay Example131-138).Similarly, According to Reid & Caelli (2005, p. 128), trusted computing is vulnerable to MitM attack when engrossd to enforce DRM if the aggressor acts as a proxy between two communicating users. This affects the flow of information because it is distorted or manipulated to suit the interests of the attacker. Computers that use unencrypted interlocks are vulnerable to attacks by the man in the middle because their network traffic is easily grabbed (Luotonen 1998, p. 120).In order to avoid the vulnerability of trusted computing to MitM attacks when enforcing DRM, it is advisable for communicating computers to use encrypted network connections. This may be offered by the Https technology that makes it tricky for an attacker to interfere with the network traffic (Reid & Caelli 2005, p. 129). The Https is efficient because of the safe sockets layer (SSL) facility that shields the web-based network interchange from unauthorized users. Th e Https also uses certificates that can prove the identity of the servers a computer is interacting with over the internet (Strebe 2006, p.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.