Current Solution for Reducing Risks of Play Out Servers

Newsroom Security: A survey paper

Rezza Moieni, Ikuesan R. Adeyemi

Abstract


Newsroom play a very significant role in the modern day news production, and a vast array of technological advancement is being introduced to improve communication efficiency but surprisingly, threats to the security of the network and communication channel, server systems, and work stations ; external and internal alike, of the newsroom are often overlooked/neglected. This threats if not mitigated could compromise the security of the newsroom and consequently jeopardize the integrity, reputation and even the safety of journalist. This survey studied the possible threats to newsroom and its possible effect, as well as possible mitigation to these threats.


Full Text:

PDF

References


W.A. Arbaugh, J.R. Davin, D.J. Farber, and J.M. Smith. 1998. Security for virtual private intranets. Computer 31, 9 (1998), 48–55.

D E Avrin, K P Andriole, L Yin, R Gould, and R L Arenson. 2000. Simulation of disaster recovery of a picture archiving and communications system using off-site hierarchal storage management. Journal of digital imaging : the official journal of the Society for Computer Applications in Radiology 13, 2 Suppl 1 (May 2000), 168–70.

D E Avrin, K P Andriole, L Yin, R G Gould, and R L Arenson. 2001. A hierarchical storage management (HSM) scheme for cost- effective on-line archival using lossy compression. Journal of digital imaging : the official journal of the Society for Computer Applications in Radiology 14, 1 (March 2001), 18–23.

Nazim Baksh. 2010. Beyond Flak Attack: A New Engagement with the Newsroom. Technical Report. Tabah Fundation. CCSDS. 2003. Consultative Committee for Space Data Systems. Technical Report.

K.H. Cheung and J. Misˇic ́. 2002. On virtual private networks security design issues. Computer Networks 38, 2 (Feb. 2002), 165–179.

Simson L. Garfinke. 2003. Enabling email confidentiality through the use of opportunistic encryption. In dg.o ’03 Proceedings of the 2003 annual national conference on Digital government research. 1–4.

Liu Haiyan, Yang Zhaohong, and Zhang Zhanjun. 2010. Study on the Detection and Analysis Technique of Intranet Security. In 2010 International Forum on Information Technology and Applications. IEEE, 134137.

B. Harris and R. Hunt. 1999. TCP/IP security threats and attack methods. Computer Communications 22, 10 (June 1999), 885–897.

Paul Hoffman. 1998. Putting it together: designs on Internet mail. netWorker 2, 1 (March 1998), 19–23. DOI:http://dx.doi.org/10.1145/280437.280444

Minh Huynh, Stuart Goose, and Prasant Mohapatra. 2010. Resilience technologies in Ethernet. Computer Networks 54, 1 (Jan. 2010), 57–78.

Rodger Jamieson and Graham Low. 1989. Security and control issues in local area network design. Computers & Security 8, 4(June 1989), 283–290.

Gyoo-Yeong Jeong, Dong-il Seo, Soo-Gab Kwon, and Jeong-Ho Kim. 2007. Intranet Security Evaluation Using Hacking Techniques. In The 9th International Conference on Advanced Communication Technology. IEEE, 810–814.

Kevin Kawamoto, David Carlson, Cheryl Diaz Meyer, Rich Gordon, John Pavlik, Adam Clayton Powell III, Patricia M. Radin, Paul W. Taylor, and Melissa A. Wall. 2004. Digital Journalism: Emerging Media & the Changing Horizons of Journalism. Rowman & Littlefield Publishers.

S. Kent. 1981. Security Requirements and Protocols for a Broadcast Scenario. IEEE Transactions on Communications 29, 6 (June 1981), 778–786.

Rinat Khoussainov and Ahmed Patel. 2000. LAN security: problems and solutions for Ethernet networks. Computer Standards & Interfaces 22, 3 (Aug. 2000), 191–202.

Paul King. 2007. In the new converged world are we secure enough? Information Security Technical Report 12, 2 (Jan. 2007), 90–97.

Chin-Chuan Lee. 2000. Power, Money, and Media: Communication Patterns and Bureaucratic Control in Cultural China (Media Topographies). Northwestern University Press.

Scott Matics. 2010. Automating newsroom workflow. Broadcast Engineering (2010).

BBC News. 2011a. Behind the scenes at the cradle of TV. (2011).

BBC News. 2011b. Closing the BBC News Desktop Alert and Ticker. (2011).

Quyen L. Nguyen and Dyung Le. 2010. Archival asset package design concept for an OAIS system. In Proceedings of the 2010 Roadmap for Digital Preservation Interoperability Framework Workshop on - US-DPIF ’10. ACM Press, New York, New York, USA, 1–10.

Dennis Nicholson and Milena Dobreva. 2009. Beyond OAIS: towards a reliable and consistent digital preservation imple-

mentation framework. In DSP’09 Proceedings of the 16th international conference on Digital Signal Processing. IEEE Press Piscataway, 104–111.

Mike Palmer. 2008. Newsroom Workflow. News Operations/Whitepaper (2008), 52–54.

Vahid Ranjbar. 2011. The Narrator, Iran:Baqney. (2011).

H.R. Rao. 2003. Intrusion countermeasures security model based on prioritization scheme for intranet access security (emerging concepts category). In IEEE Systems, Man and Cybernetics SocietyInformation Assurance Workshop, 2003. IEEE, 174–181.

Kuheli Roy Sarkar. 2010. Assessing insider threats to information security using technical, behavioural and organisational measures. Information Security Technical Report 15, 3 (Aug. 2010), 112–133.

Danny Schechter. 2003. How Media Has Changed Since the Day that ’Changed Everything’. Technical Report. Common-Dreams.org.

Syngress, Dale Liu, Stephanie Miller, Mark Lucas, Abhishek Singh, and Jennifer Davis. 2006. Firewall Policies and VPN Configurations. Syngress.

Paula Viana, Mario Cordeiro, Vitor Rodrigues, Damien Bommart, Giullia Ferrari, Massimo Starmbini, Ingo Hoentsch, Tobias Marx, Wlater Bernet, Edgar Muller, Bernard Cousin, Mathurin Body, Serge Daulard, Bernard Algayres, Marc Laurentin, and Inesc Porto Isep. 2003. A Unified Solution for the Integration of Media Applications and Products in Broadcaster Environments - The ASSET Architecture. Technical Report.

Mark Warner. 2008. IP-based centralcasting. Technical Report. Broadcast Engineering. Jerry Whitaker. 2005. Standard Handbook of Broadcast Engineering. McGraw-Hill Professional.

Charles Cresson Wood and William W. Banks. 1993. Human error: an overlooked but significant information security problem. Computers & Security 12, 1 (Feb. 1993), 51–60.

KISO Yasuharu and FUKASAKU Masaki. 2011. Total Nonlinear Editing Solution that Supports News Production Workflow. NEC Technical Journal 6, 3 (2011), 38–41.


Refbacks

  • There are currently no refbacks.