Secure Video Data With Disk Publishing

Sherman, Tom
July 2006
Security: Solutions for Enterprise Security Leaders;Jul2006, Vol. 43 Issue 7, p53
Trade Publication
The article describes techniques for safeguarding the contents of compact discs and digital video discs. The three protection technologies are encryption of the disk, implantation of a link between the data and the disk and use of compact discs and digital video discs manufactured specifically so they can not be copied.


Related Articles

  • Data Hardly Ever Dies: Encrypt Your Warriors' Laptops. Smith, Warren // Security: Solutions for Enterprise Security Leaders;Feb2007, Vol. 44 Issue 2, p74 

    The article provides information on the need to encrypt laptop data in the U.S. In a recent survey conducted it revealed that business traveler face a risk when their laptops are stolen and many companies are sued in court for privacy breaches by consumers whose personal data are exposed to the...

  • 12 disc-burning tips. CASSELS, JOE // APC (Bauer Media Group);Jun2011, Vol. 31 Issue 6, p86 

    The article presents tips for storing data in optical disks including compact disks and DVDs. It is said that using a dedicated disc-burning program like CD BurnerXP makes burning data to disc simpler. It is suggested to use application software TrueCrypt to encrypt files on a disc. ImgBurn is...

  • Techno. Newman, Keith // Metro (NZ);Jul99, Issue 217, p114 

    Deals with digital versatile disks (DVD). Movie, music and computer industries' support for the technology; Capacity of a DVD; Encryption measures.

  • Addressing the physical security of encryption keys. Joshi, Swati // Microwaves & RF;Dec2007 Defense Electronics S, Vol. 46, p12 

    The article discusses the importance and implications of the physical security of encryption key in the U.S. military operations. According to the author, encryption provides compliance and protection on the different military operations using electrical and physical design techniques in various...

  • Encryption--The last line of defense. Stoller, Jacob // CMA Management;Jun/Jul2010, Vol. 84 Issue 4, p37 

    The article focuses on the issue of data encryption. It states that there is no perfect security system and measures are subject to failure no matter how elaborate they are. It highlights the case of 8,600 Ontario teachers who received letters from the Ontario Teachers Insurance Plan (OTIP)...

  • Security by typing. Debbabi, Mourad; Durgin, Nancy; Mejri, Mohamed; Mitchell, John C. // International Journal on Software Tools for Technology Transfer;Aug2003, Vol. 4 Issue 4, p472 

    We present an approach for analyzing cryptographic protocols that are subject to attack from an active intruder who takes advantage of knowledge of the protocol rules. The approach uses a form of type system in which types are communication steps and typing constraints characterize all the...

  • Protecting Campus Data. Angelo, Jean Marie // University Business;Sep2006, Vol. 9 Issue 9, p75 

    The article focuses on how universities in the U.S. protect data in laptops. William Penn University in Iowa uses LoJack for Laptops, an IT security product from Absolute Software designed to secure data and track lost or stolen portable machines. The University of Toledo in Ohio and Brown...

  • Message Based Random Variable Length Key Encryption Algorithm. Mirvaziri, Hamid; Ismail, Kasmiran Jumari Mahamod; Hanapi, Zurina Mohd // Journal of Computer Science;2009, Vol. 5 Issue 8, p573 

    Problem statement: A block ciphers provides confidentiality in cryptography but cryptanalysis of the classical block ciphers demonstrated some old weaknesses grabbing a partial key in any stage of encryption procedure leads to reconstructing the whole key. Exhaustive key search shows that key...

  • UTILIZING FRACTAL STRUCTURES FOR THE INFORMATION ENCRYPTING PROCESS. TRIVEDI, UDAI BHAN; BHARTI, R C // International Journal of Research in Commerce, IT & Management;Oct2012, Vol. 2 Issue 10, p85 

    Information security is the process which describes all measures taken to prevent unauthorized use of electronic data, whether this unauthorized use takes the form of destruction, disclosure, modification, or disruption. Information security and Cryptography are interconnected and share the...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics