TITLE

Secure Video Data With Disk Publishing

AUTHOR(S)
Sherman, Tom
PUB. DATE
July 2006
SOURCE
Security: Solutions for Enterprise Security Leaders;Jul2006, Vol. 43 Issue 7, p53
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article describes techniques for safeguarding the contents of compact discs and digital video discs. The three protection technologies are encryption of the disk, implantation of a link between the data and the disk and use of compact discs and digital video discs manufactured specifically so they can not be copied.
ACCESSION #
21657439

 

Related Articles

  • Data Hardly Ever Dies: Encrypt Your Warriors' Laptops. Smith, Warren // Security: Solutions for Enterprise Security Leaders;Feb2007, Vol. 44 Issue 2, p74 

    The article provides information on the need to encrypt laptop data in the U.S. In a recent survey conducted it revealed that business traveler face a risk when their laptops are stolen and many companies are sued in court for privacy breaches by consumers whose personal data are exposed to the...

  • Techno. Newman, Keith // Metro (NZ);Jul99, Issue 217, p114 

    Deals with digital versatile disks (DVD). Movie, music and computer industries' support for the technology; Capacity of a DVD; Encryption measures.

  • Encryption--The last line of defense. Stoller, Jacob // CMA Management;Jun/Jul2010, Vol. 84 Issue 4, p37 

    The article focuses on the issue of data encryption. It states that there is no perfect security system and measures are subject to failure no matter how elaborate they are. It highlights the case of 8,600 Ontario teachers who received letters from the Ontario Teachers Insurance Plan (OTIP)...

  • Message Based Random Variable Length Key Encryption Algorithm. Mirvaziri, Hamid; Ismail, Kasmiran Jumari Mahamod; Hanapi, Zurina Mohd // Journal of Computer Science;2009, Vol. 5 Issue 8, p573 

    Problem statement: A block ciphers provides confidentiality in cryptography but cryptanalysis of the classical block ciphers demonstrated some old weaknesses grabbing a partial key in any stage of encryption procedure leads to reconstructing the whole key. Exhaustive key search shows that key...

  • Top Six Reasons To Use DWP3 In Pipeline Applications. Aubin, Philip // Pipeline & Gas Journal;Feb2009, Vol. 236 Issue 2, p38 

    The article discusses the reasons behind using Distributed Network Protocol (DNP3) in pipeline applications in the U.S. First was the standardization and interoperability for the DNP3 was an open and standard-based protocol. Second was flexible communications because DNP3 allows devices to...

  • CipherOptics series.  // SC Magazine: For IT Security Professionals (15476693);Nov2010, Vol. 21 Issue 11, p46 

    The article evaluates the series of network encryption devices from CipherOptics including CipherEngine, CEP10-R and CEP100.

  • A Context-aware Access Control Model for Pervasive Environments. Al-Rwais, Sumayah; Al-Muhtadi, Jalal // IETE Technical Review (Medknow Publications & Media Pvt. Ltd.);Sep/Oct2010, Vol. 27 Issue 5, p371 

    Pervasive environments are dynamically changing environments with enormous amounts of information available for access from anywhere. This paper presents a framework for context-aware access control using threshold cryptography (CAAC-TC) where the administration of access control is distributed...

  • The Simple Way to Keep Your Private Files Private. Dunn, Scott; Spanbauer, Scott // PC World;May2007, Vol. 25 Issue 5, p115 

    This article explains that there is only one way to one's files really confidential and that is by encrypting them. It says that most Windows versions' Encrypting File System (EFS) in Vista, XP and 2000 scrambles the contents of files and folders, thus making it really difficult for other people...

  • Better Security Through Zip.  // InfoWorld;5/10/2004, Vol. 26 Issue 19, p14 

    This article evaluates the line of security-related products from PKWare, the company that originated the venerable Zip archive format. The product, debuting as Version 8, SecureZip for Windows, allegedly combines Zip compression with strong Rivest, Shamir, and Adelman encryption in a secure...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics