Network Security Illustrated buy the book at Amazon now!


search site
Table of Contents

Book
Introduction

Managing
Security

Outsourcing
Options

Reserving
Rights

Determining
Identity

Preserving
Privacy

Connecting
Networks

Hardening
Networks

Storing
Information

Hiding
Information

Accessing
Information

Ensuring
Availability

Detecting
Intrusions

Page Tools
print this pagePrint this Page
Reserving
Rights
Chapter List
Digital Rights Management
Copy Protection
Digital Watermarking (web bonus)
More Information
Resources (links)
Discussions
FAQs
Errata
Sample Pages
Buy The Book
at amazon.com

Summary

How do you secure something that you’ve already given to someone else? How do you prevent digital information from being duplicated? How do you know when something has been duplicated illegally? Maintaining control of digital rights has become one of the most controversial and complicated aspects of security. A rapidly growing industry is addressing many of these core issues. This part will explore the various problems facing digital rights control.

Key Points

  • Businesses that create and profit from digital content need practical ways to enforce their legal intellectual property rights as part of their overall security strategy.
  • Rights can be enforced through technology, economics, and the legal system.
  • Rights can also be circumvented through technology, economics, and the legal system
  • Businesses often use a combination of these three methods in order to successfully protect their intellectual property.
  • Maintaining the relevancy of intellectual property laws has been a struggle since the 1960s because of new technologies and a globalized economy.

Connections

The technologies currently being used to manage digital rights are those that support existing legislation. Digital watermarking enables companies to collect evidence of misuse, which can be used to support legal enforcement. Copy protection techniques attempt to prevent unauthorized use in the first place. This part contains the following chapters:
  • Digital Rights Management discusses the business strategies and related technologies for controlling intellectual property rights across digital and traditional media.

  • Copy Protection examines technology used to prevent the unauthorized duplication of digital media.

  • Digital Watermarking (web bonus) technology creates and detects invisible “markings”, which can be used to trace the origin, authenticity and usage of digital data.

More Information

The above information is an excerpt from "Network Security Illustrated," published by McGraw-Hill and available from amazon.com, as well as your local bookstore. The book goes into much greater depth on this topic. To learn more about the book and what it covers, click here.

Below, you'll find links to online resources that supplement this portion of the book.


Resources

(websites, books, etc.)

Discussions

FAQs

Errata

Sample Pages