Page 460 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 460

variety of formats. ADEPT uses a combination of AES technology to
               encrypt the media content and RSA encryption to protect the AES key.

               Many e-book readers, with the notable exception of the Amazon
               Kindle, use this technology to protect their content. Amazon’s Kindle
               e-readers use a variety of formats for book distribution, and each
               contains its own encryption technology.


               Video Game DRM

               Many video games implement DRM technology that depends on
               consoles using an active internet connection to verify the game license

               with a cloud-based service. These technologies, such as Ubisoft’s
               Uplay, once typically required a constant internet connection to
               facilitate gameplay. If a player lost connection, the game would cease
               functioning.

               In March 2010, the Uplay system came under a denial-of-service
               attack and players of Uplay-enabled games around the world were
               unable to play games that previously functioned properly because their

               consoles were unable to access the Uplay servers. This led to public
               outcry, and Ubisoft later removed the always-on requirement, shifting
               to a DRM approach that only requires an initial activation of the game
               on the console and then allows unrestricted use.


               Document DRM

               Although the most common uses of DRM technology protect
               entertainment content, organizations may also use DRM to protect the
               security of sensitive information stored in PDF files, office productivity

               documents, and other formats. Commercial DRM products, such as
               Vitrium and FileOpen, use encryption to protect source content and
               then enable organizations to carefully control document rights.

               Here are some of the common permissions restricted by document
               DRM solutions:

                    Reading a file

                    Modifying the contents of a file

                    Removing watermarks from a file
   455   456   457   458   459   460   461   462   463   464   465