Asia-Pacific Broadcasting (APB) September 2017 Volume 34, Issue 7 - Page 27

MANAGEMENT September 2017 multi-pronged tent security dozens of millions,” he says. “Both content producers and service providers suffer significantly from the loss of legal viewers and the corresponding loss of subscriber fees and advertising revenues — strong, efficient security and anti- piracy services are essential.” Also as important, future- proof your content protection, in order to keep up with the new security requirements arising from the expansion of TV viewing into 4K/Ultra HD (UHD) and high dynamic range (HDR). Lamenting that service providers are often reluctant to adopt new approaches to content protection, Berkovich says: “The rapid evolution of con- tent creation and delivery makes it critical that they be ready for change and are willing to choose the most flexible technologies for preserving the integrity of their service offerings.” One operator looking to buffer its IPTV ecosystem is ZTE Corpo- ration, who has adopted Conax’s Connected Access IPTV security client. Fang Hui, VP, ZTE Cor- poration, highlights: “As we aim to tap the broad opportunities forecasted in the coming year for the IPTV market, ZTE sees strong synergies in partnering with Conax to provide their leading security technology for our global IPTV offering.” Connected Access is a security client catering for multiple uses, including IPTV and over-the-top (OTT), for connected set-top boxes (STBs). Through a secu- rity client, operators can securely deliver video content over both IPTV multicast and OTT adap- tive streaming, irrespective of the streaming protocol used. This, ac- cording to Tor Helge Kristiansen, EVP, principal architect, Conax, “significantly simplifies” the key management processes and en- sures consistency in the business rules and enforcement of content restrictions across any distribution platform. “For ZTE, this means they can focus on building the best services with the best user experi- ence and be rest assured that the Connected Access solution will handle the security in the best possible way,” he adds. Kristiansen also observes how tougher security challenges are not only becoming more visible, but also growing at an “alarming rate”. Of these, traditional pay-TV piracy, in which pirates sell illegal access to operators’ TV services, remains a major threat. “Select- ing a good CAS/DRM solution and STB chipset equipped with a sound security design is the best countermeasure towards these types of attacks,” he offers, while identifying the growing trend of illegal restreaming of content over the Internet. Tor Helge Kristiansen, EVP, principal architect, Conax: Traditional pay-TV piracy, in which pirates sell illegal access to operators’ TV services, remains a major threat. Manifested as individual mov- ies provided through bit torrent sites, or as live streaming of com- plete TV services, these types of attacks can be difficult to prevent. Kristiansen elaborates: “In these instances, the security of the HDMI port is known to be broken, making it easy for pirates to get hold of the content in a format suitable for restreaming. “To fight these types of attacks, the best countermeasure is foren- sic watermarking solutions com- bined with advanced anti-piracy services. This enables operators and content owners to locate and shut down the sources of illegal redistribution.” Perhaps, there is one threat that is most disturbing, Kristian- sen cautions — hackers who are increasingly launching sophisti- cated cyberattacks targeting large ransom payments to restore stolen or locked-down information. A homogenous population of hybrid STBs, he adds, can be considered an ideal target for such attacks as they are effectively ad- vanced computers that may be less protected than a home PC. “The security challenges to be overcome by a modern STB include catering for attacks aimed at getting access to the content itself, as well as the ability to use the STBs to launch ransom attacks or even DDoS (distributed denial of service) at- tacks on critical infrastructure or businesses.” To mitigate this threat and prevent attacks, operators need to protect their platforms and their subscribers by ensuring that they introduce only STBs that have been designed and evaluated to the highest security standards, Kristiansen concludes. Where security is concerned, 27 ❝ The rapid evolution of content creation and delivery makes it critical that they be ready for change and are willing to choose the most flexible technologies for preserving the integrity of their service offerings. ❞ — Leonid Berkovich, VP marketing, products and solutions, Viaccess-Orca there is perhaps one golden rule — there will always be some new or previously unappreciated points of weakness that might be the source of a new exploit, Verimatrix’s Oetegenn expresses. “That’s why pay-TV revenue pro- tection specialists like Verimatrix are already deploying machine learning and artificial intelligence (AI) to protect customers’ video services and are extending these to the Internet of Things (IoT), both for proactive monitoring and post-attack response,” he explains. Going further, Verimatrix has identified a number of core elements relating to IoT security lifecycle management: n Device integrity, which im- plies that measures have been tak- en to detect and prevent attempts to hijack devices. This would be achieved firstly by ensuring the integrity of the bootstrap process by which devices obtain informa- tion to allow them to be authenti- cated for operation within an IoT domain, and secondly by ensuring integrity of the devices’ updating processes to prevent subsequent attacks. n Authentication and secure communication, which serve to ensure that only devices explicitly identifiable are allowed to join a given IoT network, and that com- munications are protected from interce ѥȁѕɅѥɥ)Ʌͥи)AɽѥٔѡɕЁѽȴ)ݡ͕ٕ́Ѽхѡ)͕ɥ䁽фѕ䁄)ѕ٥ٕȁ́危)ѽɥ́ɔͽ )ѥѕЁݥɔѼ)х́ɱ䁽ȁٕ͹)ѡЁɔѡ䁽ȸ)́=QPɽɅѥ)́ͥ͡ѥѡ)͡ȁ٥ͥ䁽=QPݽɭ)ɕ͕́Սɔ٥)хɝЁȁх̸Q͔ѡɕ̰)́ͅ=ѕɔͼ٥)役ЁѕЁѡиq٥)ɔ܁Սɔ͍ѥ)ѼɅѕٕ́)ɸѡѼљɵ́)չ剕Ʌх̳tх̸+qQ́٥Ё䁄ɕ)LхѡЁѕYḬ)́ͽ%P)٥̰Ց䁵ѽ)ٕɅ̻t+q%Ё́٥ЁѡЁ͔)ɥ䁵ɕ́͡ձ)Ѽͥѥ)ѼɕٕЁչѡɥ͕)ɥѕѕЃPѡɔ)܁ɝЁȁ͕ɥ)Ёѡɽѕѥѡ)٥́ݡt)QɕٕЁх̰Ʌѽ́ѼɽՍ)MQ ́ѡЁٔͥ)مՅѕѼѡЁ͕ɥхɑ̸