Monday, May 13, 2019

DRM and trusted computing Essay Example | Topics and Well Written Essays - 250 words

DRM and trusted computing - Essay Example131-138).Similarly, gibe to Reid & Caelli (2005, p. 128), trusted computing is vulnerable to MitM attack when used to enforce DRM if the attacker acts as a placeholder between two communicating users. This affects the flow of information because it is distorted or manipulated to suit the interests of the attacker. Computers that use unencrypted networks are vulnerable to attacks by the man in the middle because their network traffic is easily grabbed (Luotonen 1998, p. 120).In say to avoid the vulnerability of trusted computing to MitM attacks when enforcing DRM, it is advisable for communicating electronic computers to use encrypted network connections. This may be offered by the Https technology that makes it tricky for an attacker to interfere with the network traffic (Reid & Caelli 2005, p. 129). The Https is efficient because of the safe sockets grade (SSL) facility that shields the web-based network interchange from unauthorized us ers. The Https also uses certificates that can prove the identity of the servers a computer is interacting with over the internet (Strebe 2006, p.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.