Bruce’s Shorts | 4.7 - Security - What Does That Mean?

In a new series of Bruce’s Shorts, Bruce Devlin looks at computer security. There are many aspects to security and in this Short, Devlin introduces the topic in preparation for more detail in upcoming episodes.

Security in a hoot topic with many instances of hacks reported in the news. Everyone likes to have good security.

Security protects against specific threats. Devlin raises questions about access, authentication and authorization.

Security is about trade-offs between cost and security. There is no such thing as perfect security, and it is always a compromise. Future episodes will look at the technology behind security.

You might also like...

Transitioning to Broadcast IP Infrastructures; Part 1 – Initial Planning and Scoping

Our first Essential Insights is a set of three video episodes in which we discuss transitioning to IP with industry experts. We explore the fundamental challenges during the planning stage. The decisions that need to be made, and the long-term thi…

NMOS Progress For Broadcast Control

IP networks are delivering outstanding success for broadcasters, both in terms of scalable functionality and flexibility. And the recent NMOS suite of specifications is improving integration and control, with IS-06 and IS-07 accelerating the process.

IP Network Performance Relies On Real-Time Management

By now it’s become clear that IP networks bring new types of useful capabilities and flexibility that can’t be ignored. However, if you want to ensure Quality of Service (QoS) by minimizing packet loss, latency and adverse network rel…

Solving IP Routing For Broadcasters: Part 1 - Enabling Software Control

SDI and IP differ fundamentally in their approach to data transport as SDI is circuit switched and IP is packet switched. This provides interesting challenges for us as we start to consider what it means to route IP signals.

Computer Security: Part 3 - Circles Of Protection

There are many different requirements and expectations in the field of computer security and it may be as well to set out what some of them are. Computation is everywhere, from the ubiquitous iPhone to the military computer in an…