TITLE

Security goes soft (ware)

AUTHOR(S)
Hawley, Steve
PUB. DATE
October 2007
SOURCE
Telephony;Oct2007 IPTV Supplement, Vol. 248, p24
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article focuses on the hardware- and software-based approaches to video content security. It is considered that hardware-based content security adds significant cost to the deployment. The author stresses that content protection systems offer interlocking capabilities such as encryption and authentication. He emphasizes that the shift from hardware to software will likely accelerate as multiservice convergence continues to move into commercial deployment.
ACCESSION #
27424531

 

Related Articles

  • Vulnerability Scanning.  // Network Dictionary;2007, p520 

    An encyclopedia entry for "Vulnerability Scanning" in computer security is presented. It refers to the process of using some software or hardware tools to identify vulnerabilities of computing systems in a network in order to determine if and where a system can be exploited and/or threatened....

  • The dangers of zero-day. Ollmann, Gunter // SC Magazine: For IT Security Professionals (UK Edition);Jan2005, p62 

    This article presents measures to protect against zero-day vulnerability in computer systems. By definition, a zero-day vulnerability is a security flaw that the associated software or hardware vendor is either not aware or is currently working on a fix, and no patch or product update is...

  • CALCULATING COSTS OF HARDENING SECURITY SYSTEMS.  // Baseline;12/15/2005, Issue 53, p33 

    The article stresses the importance of hardening information security systems. Stronger internal controls will support and maintain security systems. This can be done by educating and training the general staff on security concerns, a task which can be assigned to information technology staff...

  • IDS/IPS may offer the perfect partnership for IT security management. Cracknell, Phil // Computer Weekly;8/30/2005, p7 

    The article presents information about the benefits of using mobile adaptive security systems. A common criticism of many operating system suppliers and their history of patching is either that the patches themselves cause new problems, or that they are not developed and released quickly enough...

  • Hardware versus Software Approaches to Encrypting Data for Security. Toubbe, Karim // Database Trends & Applications;Dec2005, Vol. 19 Issue 12, p16 

    The article focuses on the use of data encryption by business enterprises to combat data theft and to ensure compliance with a range of legislative and industry mandates. The two types of approaches in considering encryption is the deployment of software-based products and the hardware-based...

  • 10-Step Security. O'Reilly, Dennis // PCWorld;Nov2005, Vol. 23 Issue 11, p119 

    The article offers step-by-step instructions that will help protect computer hardware, software, and data from computer viruses. It outlines examples of computer security software, techniques that can be used to protect your data, and how to use the Windows Security Center.

  • Lean and Mean. Branzburg, Jeffrey // Tech & Learning;Feb2007, Vol. 27 Issue 7, p28 

    The article offers tips on how to keep personal computer run smoothly. The author suggests that users must empty the trash and the recycle bin to free up space by using software applications such as Sure Delete and Digital File Shredder, clear the Internet cache and the Web history to speed up...

  • Secure Instant Messages. Garza, Victor R.; McDonald, Anne B. // PCWorld;Nov2003, Vol. 21 Issue 11, p96 

    Reviews the IMsecure Pro software program from Zone Labs.

  • XFire helps pinpoint Web application bugs. Powell, Thomas // Network World;8/2/2004, Vol. 21 Issue 31, p36 

    Modern Web applications are a conglomerate of many individual moving parts. Web server software and hardware, application servers, database systems, custom developed applications, a variety of network devices, the network transport and, of course, the ever-present Web browser all present...

Share

Read the Article

Other Topics