Secure Video Data With Disk Publishing

Sherman, Tom
July 2006
Security: Solutions for Enterprise Security Leaders;Jul2006, Vol. 43 Issue 7, p53
Trade Publication
The article describes techniques for safeguarding the contents of compact discs and digital video discs. The three protection technologies are encryption of the disk, implantation of a link between the data and the disk and use of compact discs and digital video discs manufactured specifically so they can not be copied.


Related Articles

  • Data Hardly Ever Dies: Encrypt Your Warriors' Laptops. Smith, Warren // Security: Solutions for Enterprise Security Leaders;Feb2007, Vol. 44 Issue 2, p74 

    The article provides information on the need to encrypt laptop data in the U.S. In a recent survey conducted it revealed that business traveler face a risk when their laptops are stolen and many companies are sued in court for privacy breaches by consumers whose personal data are exposed to the...

  • Techno. Newman, Keith // Metro (NZ);Jul99, Issue 217, p114 

    Deals with digital versatile disks (DVD). Movie, music and computer industries' support for the technology; Capacity of a DVD; Encryption measures.

  • Encryption--The last line of defense. Stoller, Jacob // CMA Management;Jun/Jul2010, Vol. 84 Issue 4, p37 

    The article focuses on the issue of data encryption. It states that there is no perfect security system and measures are subject to failure no matter how elaborate they are. It highlights the case of 8,600 Ontario teachers who received letters from the Ontario Teachers Insurance Plan (OTIP)...

  • Message Based Random Variable Length Key Encryption Algorithm. Mirvaziri, Hamid; Ismail, Kasmiran Jumari Mahamod; Hanapi, Zurina Mohd // Journal of Computer Science;2009, Vol. 5 Issue 8, p573 

    Problem statement: A block ciphers provides confidentiality in cryptography but cryptanalysis of the classical block ciphers demonstrated some old weaknesses grabbing a partial key in any stage of encryption procedure leads to reconstructing the whole key. Exhaustive key search shows that key...

  • Top Six Reasons To Use DWP3 In Pipeline Applications. Aubin, Philip // Pipeline & Gas Journal;Feb2009, Vol. 236 Issue 2, p38 

    The article discusses the reasons behind using Distributed Network Protocol (DNP3) in pipeline applications in the U.S. First was the standardization and interoperability for the DNP3 was an open and standard-based protocol. Second was flexible communications because DNP3 allows devices to...

  • CipherOptics series.  // SC Magazine: For IT Security Professionals (15476693);Nov2010, Vol. 21 Issue 11, p46 

    The article evaluates the series of network encryption devices from CipherOptics including CipherEngine, CEP10-R and CEP100.

  • A Context-aware Access Control Model for Pervasive Environments. Al-Rwais, Sumayah; Al-Muhtadi, Jalal // IETE Technical Review;Sep/Oct2010, Vol. 27 Issue 5, p371 

    Pervasive environments are dynamically changing environments with enormous amounts of information available for access from anywhere. This paper presents a framework for context-aware access control using threshold cryptography (CAAC-TC) where the administration of access control is distributed...

  • Better Security Through Zip.  // InfoWorld;5/10/2004, Vol. 26 Issue 19, p14 

    This article evaluates the line of security-related products from PKWare, the company that originated the venerable Zip archive format. The product, debuting as Version 8, SecureZip for Windows, allegedly combines Zip compression with strong Rivest, Shamir, and Adelman encryption in a secure...

  • Raising the Grade. Zoran, Ronen // Government Security;Jun2004, Vol. 3 Issue 4, p20 

    Presents five tips for more secure electronic information sharing. Data encryption; Establishment of an administrative password change policy; Multiple layers of security; Regular monitoring and auditing.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics