Over the last two years broadcasting companies have become victims of high profile attacks. In September 2017 the UK’s Digital Production Partnership (DPP) and North American Broadcasters Association (NABA) published a paper on basic security requirements in documentation, testing and authentication. The project will involve the combination of government, industrial and academic institutions to develop a commercial system in the next 5 to 10 years. The system features a dynamic encryption of data transfers using lasers and code generators from the satellites to their terrestrial sources making it difficult to decode data if intercepted by unauthorised parties. the media content becomes more central to all enterprises and the distinction between broadcasting and other online services will disappear.īroadcast satellites are often at risk of cyber attacks.Īccording to the Straitstimes, Japan’s International Affairs and Communications Ministry will consider an operation to develop a new communication system to prevent satellites being exposed to cyber attacks. The security recommendations can apply equally to the cloud as broadcasting continues to shift to an IP infrastructure. The EBU R143 paper incorporates additional broadcast-specific features to take account of the vulnerabilities associated with production workflows and infrastructure being transferred to IT technologies. The European Broadcasting Union (EBU) has declared that all broadcasters and their technology suppliers are to work together over cyber security and adopt the best available practises from the IT world.įrom creation to consumption, media production networks as well as corporate IT and media storage locations need to be access-controlled in order to defend from intrusion. “To keep that door closed, broadcasters need to do more than just adopt technical standards but must also revise their overall approach to security at a human and logistical level,” says Gerben Dierick, Chief Information Security Officer at VRT in Belgium. But the idea of a perimeter and a castle keep is an old fashioned view of cyber security, according to the latest thinking.Ĭompanies must instead plan for a breach and develop and deploy policies and procedures for discovery, mitigation, remediation and reporting particularly as reputational risk is huge in broadcasting. Security appliances, intrusion prevention and malware protection are deployed to keep attackers out.īreach detection and forensics experts are needed to discover and mitigate cyber risks. Illegal streaming of content is also a huge risk to OTT companies such as Netflix and Amazon. Piracy, the theft and distribution of content prior to release is an illegal act well known to all content companies. This adds to the existing cybercrime exposure which threatens broadcast content delivery through the degradation and destruction of broadcast signals.ĬNA (computer network attacks) are a sophisticated cyber security threat designed to cripple the broadcaster by extracting content for criminal purposes.īroadcast signal intrusion is the hijacking of radio, television stations, cable television, broadcast feeds and satellite signals. Click here for more informationįailure to adhere to GDPR could result in a fine of up to 5% of global revenues in the event of loss of personal data whether through malicious actions or through misadventure. Although television, cable and satellite broadcast signal intrusions tend to receive more media coverage, radio station intrusions are more frequent, as many simply rebroadcast a signal received from another radio station.At IBC2017, an invitation-only forum on Friday 15 September will examine what the cyber war means for broadcasters, how to anticipate the next threat and how to manage a breach. Hijacking incidents have involved local TV and radio stations as well as cable and national networks, also live streams. A broadcast signal intrusion is the hijacking of broadcast signals of radio, television stations, cable television broadcast feeds, satellite signals or internet streaming without permission nor license.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |