2 cissp ® Official Study Guide Eighth Edition



Download 19,3 Mb.
Pdf ko'rish
bet249/881
Sana08.04.2023
Hajmi19,3 Mb.
#925879
1   ...   245   246   247   248   249   250   251   252   ...   881
Bog'liq
(CISSP) Mike Chapple, James Michael Stewart, Darril Gibson - CISSP Official Study Guide-Sybex (2018)

 Video Game DRM 
Many video games implement DRM technology that depends on consoles using an active 
internet connection to verify the game license with a cloud-based service. These technolo-
gies, such as Ubisoft’s Uplay, once typically required a constant internet connection to 
facilitate gameplay. If a player lost connection, the game would cease functioning. 
In March 2010, the Uplay system came under a denial-of-service attack and players of 
Uplay-enabled games around the world were unable to play games that previously func-
tioned properly because their consoles were unable to access the Uplay servers. This led to 
public outcry, and Ubisoft later removed the always-on requirement, shifting to a DRM 
approach that only requires an initial activation of the game on the console and then allows 
unrestricted use.
 Document DRM 
Although the most common uses of DRM technology protect entertainment content, orga-
nizations may also use DRM to protect the security of sensitive information stored in PDF 
fi les, offi ce productivity documents, and other formats. Commercial DRM products, such 
as Vitrium and FileOpen, use encryption to protect source content and then enable organi-
zations to carefully control document rights. 
Here are some of the common permissions restricted by document DRM solutions: 

Reading a file 

Modifying the contents of a file 

Removing watermarks from a file 


262
Chapter 7 

PKI and Cryptographic Applications

Downloading/saving a file

Printing a file

Taking screenshots of file content
DRM solutions allow organizations to control these rights by granting them when 
needed, revoking them when no longer necessary, and even automatically expiring rights 
after a specified period of time.
Networking
The final application of cryptography we’ll explore in this chapter is the use of crypto-
graphic algorithms to provide secure networking services. In the following sections, we’ll 
take a brief look at two methods used to secure communications circuits. We’ll also look at 
IPsec and Internet Security Association and Key Management Protocol (ISAKMP) as well 
as some of the security issues surrounding wireless networking.

Download 19,3 Mb.

Do'stlaringiz bilan baham:
1   ...   245   246   247   248   249   250   251   252   ...   881




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish