1,149
20
Essay, 2 pages (350 words)

Drm and trusted computing

DRM AND TRUSTED COMPUTING The setup in which trusted computing when used to enforce DRM is vulnerable to man in the middle attacks (MitM) because of the ARP spoofing. This occurs when an authorized user causes network traffic between computers communication over the internet (Lockhart 2007, p. 84). As a result, the trick user is able to monitor the data shared between the communicating victims. This is dangerous since it exposes confidential information to the trick user, which might lead to access to personal and important information (Reid & Caelli 2005, p. 127). This is because the attacker has the freedom to interrupt data frames on a system, adjust the traffic or discontinue all traffic (Luettmann & Bender 2009, p. 131-138).
Similarly, According to Reid & Caelli (2005, p. 128), trusted computing is vulnerable to MitM attack when used to enforce DRM if the attacker acts as a proxy between two communicating users. This affects the flow of information because it is distorted or manipulated to suit the interests of the attacker. Computers that use unencrypted networks are vulnerable to attacks by the man in the middle because their network traffic is easily grabbed (Luotonen 1998, p. 120).
In order to avoid the vulnerability of trusted computing to MitM attacks when enforcing DRM, it is advisable for communicating computers to use encrypted network connections. This may be offered by the Https technology that makes it tricky for an attacker to interfere with the network traffic (Reid & Caelli 2005, p. 129). The Https is efficient because of the safe sockets layer (SSL) facility that shields the web-based network interchange from unauthorized users. The Https also uses certificates that can prove the identity of the servers a computer is interacting with over the internet (Strebe 2006, p. 18-23).
List of References
Lockhart, A. (2007). Network security hacks. Beijing: OReilly.
Print.
Luettmann, B., & Bender, A. (2009). Man-in-the-middle attacks on auto-updating software. Bell
Labs Technical Journal, 3(2), 131-138.
Luotonen, A. (1998). Web proxy servers. Upper Saddle River, Nj: Prentice Hall.
Print.
Reid, J., & Caelli, W. (2005). “ DRM, Trusted Computing and Operating System Architecture.”
Australian Computer Society, Inc., 44, 127-135.
Strebe, M. (2006). Network Security Foundations Technology Fundamentals for IT Success.
Hoboken, John Wiley & Sons.

Thank's for Your Vote!
Drm and trusted computing. Page 1
Drm and trusted computing. Page 2
Drm and trusted computing. Page 3

This work, titled "Drm and trusted computing" was written and willingly shared by a fellow student. This sample can be utilized as a research and reference resource to aid in the writing of your own work. Any use of the work that does not include an appropriate citation is banned.

If you are the owner of this work and don’t want it to be published on AssignBuster, request its removal.

Request Removal
Cite this Essay

References

AssignBuster. (2021) 'Drm and trusted computing'. 16 November.

Reference

AssignBuster. (2021, November 16). Drm and trusted computing. Retrieved from https://assignbuster.com/drm-and-trusted-computing/

References

AssignBuster. 2021. "Drm and trusted computing." November 16, 2021. https://assignbuster.com/drm-and-trusted-computing/.

1. AssignBuster. "Drm and trusted computing." November 16, 2021. https://assignbuster.com/drm-and-trusted-computing/.


Bibliography


AssignBuster. "Drm and trusted computing." November 16, 2021. https://assignbuster.com/drm-and-trusted-computing/.

Work Cited

"Drm and trusted computing." AssignBuster, 16 Nov. 2021, assignbuster.com/drm-and-trusted-computing/.

Get in Touch

Please, let us know if you have any ideas on improving Drm and trusted computing, or our service. We will be happy to hear what you think: [email protected]