To Protect or Not Protect - - - Sony/BMG’s DRM Dilemma Sony’s Attempt-- Sony/BMG’s digital right’s management (DRM) “rootkit” inclusion on their music.

Slides:



Advertisements
Similar presentations
Woodland Hills School District Computer Network Acceptable Use Policy.
Advertisements

What is Digital Piracy? Digital piracy is a form of online piracy and includes the unauthorized online distribution of electronic copies of copyrighted.
DR. MIGUEL ÁNGEL OROS HERNÁNDEZ 8. Cracking. Cracking Magnitude of piracy  All kinds of digital content (music, software, movies)  Huge economic repercussions.
1 COMPUTER SECURITY AND ETHICS Chapter Five. Computer Security Risks 2.
Dr. John P. Abraham Professor UTPA 2 – Systems Threats and Risks.
Rootkit Definition A rootkit is a collection of tools (programs) that enable administrator-level access to a computer or computer network. Typically, a.
ROOTKIT VIRUS by Himanshu Mishra Points to be covered Introduction History Uses Classification Installation and Cloaking Detection Removal.
Copyright Infringement
Spyware! THE BAD, THE WORSE, AND THE Ugly … ARE ALL INDICATIONS THAT SPYWARE MAY BE TAKING OVER YOUR COMPUTER!
CS Nathan Digangi.  Secret, undocumented routine embedded within a useful program  Execution of the program results in execution of secret code.
The Downside to DRM. What is DRM? “Digital Rights Management” Software used to control access to copyrighted material Protect company from piracy.
Vijay krishnan Avinesh Dupat  Collection of tools (programs) that enable administrator-level access to a computer or computer network.  The main purpose.
Rootkits: Sneaky, Stealthy Toolboxes
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
Internet Safety for Students Malicious Programs By: Mr. Bradshaw Scott City R-1 Schools.
Chapter Nine Maintaining a Computer Part III: Malware.
© Folens 2008 Cultural changes in music Brought about by ICT.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Hands-On Microsoft Windows Server 2008
Open up Evernote, mini whiteboards.  2 minutes – write down as many as you can think of.
Rootkits. EC-Council The Problem  Microsoft Corp. security researchers are warning about a new generation of powerful system-monitoring programs, or.
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
Malware Adware Removal Best Free Malware Virus Protection Best Free Malware Adware Removal Service Best free Anti Spyware Removal Service Best free Trojan.
D. Beecroft Fremont High School VIRUSES.
Administrator Protect against Malware by: Brittany Slisher and Gary Asciutto.
 a crime committed on a computer network, esp. the Internet.
DRM and You. DRM – What is it? DRM is Digital Rights Management - technology used to control access to digital data or hardware, which may include (but.
Trojan Virus By Forbes and Mark. What is a Trojan virus Trojans are malicious programs that perform actions that have not been authorised by the user.
Attack Plan Alex. Introduction This presents a step-by-step attack plan to clean up an infected computer This presents a step-by-step attack plan to clean.
Digital Rights Management Maxim Fastovsky. What is DRM? DRM technologies attempt to control use of digital media by preventing access, copying or conversion.
DRM. What is DRM Digital Rights management Used to describe a number of techniques used to restrict the use of digital media.
 Introduction  Origins  Implementations  Effectiveness  Response  Summary.
Mathieu Castets October 17th,  What is a rootkit?  History  Uses  Types  Detection  Removal  References 2/11.
 Awesome Stuff Cyber Security Tyler Hoover Auburn University.
Problem Based Learning Project Presented by Penny Reagan, Elizabeth Stewart & Stephanie Watkins.
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It.
Module 8 : Configuration II Jong S. Bok
Firewall firewalls Is a program on your computer to protect your computer from all types of threats and if you have a server and you wasn’t to protect.
Trojans Daniel Bartsch CPSC 420 April 19,2007. What is a Trojan? Trojans are malware Named after Odysseus’s mythical trick Embedded in a program Cause.
BACKDOORS By: Himie Freeman, Joey Adkins, Kennedy Williams, and Erin Bethke.
Jan 11 Encryption and Hacking Encryption turns normal text into nonsense, and changes it back with a key. To someone who is not authorised to view it,
Understand Malware LESSON Security Fundamentals.
Types of Malware © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
"Most people, I think, don't even know what a rootkit is, so why should they care about it?" - Thomas Hesse, President of Sony's Global Digital Business.
Woodland Hills School District Computer Network Acceptable Use Policy.
Candidates should be able to:  describe the purpose and use of common utility programs for:  computer security (antivirus, spyware protection and firewalls)
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
Digital Rights Management Zach Milko. Overview Definition Why it exists DRM Today  Fairplay Opponents of DRM  DefectiveByDesign.org Future Conclusion.
Network Protection Against: Worms, Viruses, and Root Kits Ryan Del Vecchio Cosc. 352 October 1, 2008.
Chapter 3.  The advantages and disadvantages of: ◦ Client-Server Networks & ◦ Peer-to-Peer Networks.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Computer Security Keeping you and your computer safe in the digital world.
Digital Rights Management (DRM) Kamil Kaminski. Personal Example, Playing a Blu-ray Disc Blu-ray and BD+/AACS encryption:  AACS (Advanced Access Content.
From: windows-7-password.html.
Complete Steps to slay the Apple Music DRM dragon
Botnets A collection of compromised machines
Managing Windows Security
Introduction to Computers
Malware Creators Are Quite Clever, You Know...
Norton safeguards your PC and other devices to it required regular updating. If you unable to do the same you can call Norton Internet Security support.
Contact Norton Support by Phone if your Antivirus is not working.
THE STRUGGLE OF THE MUSIC INDUSTRY
Steps to fix AVG Error 0xe001f94e Call
Rootkit A rootkit is a set of tools which take the ability to access a computer or computer network at administrator level. Generally, hackers install.
Botnets A collection of compromised machines
Computer Applications Unit B
By Jake Schmitt, Seth Raleigh, Neil McLain
Digital Rights Management (DRM)
Lab 7 – Defeating MALWARE
Presentation transcript:

To Protect or Not Protect Sony/BMG’s DRM Dilemma Sony’s Attempt-- Sony/BMG’s digital right’s management (DRM) “rootkit” inclusion on their music CDs has been another effort in trying to prevent the piracy of music. Sony’s “root kit” is a program that installs itself along with drivers secretly when you access your music CD. It alters the way Windows plays the CDs by taking control of certain computer processes related to the use of the CD and by redirecting the system to use the secretly installed drivers. Using this, Sony could ensure that only computers with this “rootkit” could access the CDs and that you could not upload the music indefinitely. However, this anti-piracy software was discovered and found to be a huge risk for user’s computers. Sony’s Attempt-- Sony/BMG’s digital right’s management (DRM) “rootkit” inclusion on their music CDs has been another effort in trying to prevent the piracy of music. Sony’s “root kit” is a program that installs itself along with drivers secretly when you access your music CD. It alters the way Windows plays the CDs by taking control of certain computer processes related to the use of the CD and by redirecting the system to use the secretly installed drivers. Using this, Sony could ensure that only computers with this “rootkit” could access the CDs and that you could not upload the music indefinitely. However, this anti-piracy software was discovered and found to be a huge risk for user’s computers. The Risks-- --AOL reported that if you loose your original CD, you will loose rights to the music you already uploaded. --People found that you had to erase all your files if you went bankrupt or moved out of the country. But how would Sony know this? Sources have reported that anti-piracy software leaves a “backdoor” open so the “rootkit” can upload information about your use of Sony CDs to their server. Creating this backdoor also makes it easier for malware and viruses to infect your computer. --Many computer techies have found that if you try to remove the “rootkit” software it will cause harm to your computer including disabling the use of your Sony CDs on your computer, disabling the CD-Drive, and even worse, disabling your operating system. The Risks-- --AOL reported that if you loose your original CD, you will loose rights to the music you already uploaded. --People found that you had to erase all your files if you went bankrupt or moved out of the country. But how would Sony know this? Sources have reported that anti-piracy software leaves a “backdoor” open so the “rootkit” can upload information about your use of Sony CDs to their server. Creating this backdoor also makes it easier for malware and viruses to infect your computer. --Many computer techies have found that if you try to remove the “rootkit” software it will cause harm to your computer including disabling the use of your Sony CDs on your computer, disabling the CD-Drive, and even worse, disabling your operating system. The Outcome-- Sony/BMG tried to protect their artist’s music from piracy only to have it backfire in their face. Sony/BMG was sued by several parties after which Sony made a recall on all the CDs that contained this anti-piracy software, approx. 2 million CDs. They offered consumers an exchange of their CD and access to free MP3s.