Cybersecurity for Broadcasters

  • Broadcast Cybersecurity Precautions & Verification - $15

    Date: April 3, 2024
    Topics: ,

    Cybersecurity continues to be a challenge and a priority for the broadcast IT engineer. Cyber threats and tactics continue to evolve and the proper cybersecurity precautions must be implemented to protect the IP dependent broadcast plant and ensure reliable operation. Proactive precautions must be in place and must be verified before any unknown gaps are exploited by the cybercriminal. This paper and accompanying presentation will provide practical to-do cybersecurity precaution steps and techniques to verify precautions thought to be in place are effectively implemented.

    Wayne Pecena | Texas A&M University, Educational Broadcast Services – KAMU TV & FM | College Station, Texas, United States



  • Convergence of Artificial Intelligence, Cybersecurity, and Broadcasting: Understanding a New Way of Looking at a Legacy Service - $15

    Date: April 3, 2024
    Topics: ,

    The convergence of Artificial Intelligence (AI), Cybersecurity, and Broadcasting represents a transformative juncture in multimedia. The forces driving this multidisciplinary synergy are technological advancements reshaping content creation, delivery, and protection. The author will discuss the implications of convergence, analyzing its impact on content production, distribution, and the evolving threat landscape, including customer premises, broadcaster networks, and vendor networks. As broadcasters increasingly rely on AI-driven content production, they must bolster cybersecurity to protect their media and business assets. In addition, customers must be aware of utilizing the existing protection provided by their intelligent televisions. Broadcasters may leverage AI and associated technologies to analyze viewer preferences and behavior, optimizing content curation and delivery. Strong cybersecurity measures are necessary to protect broadcast infrastructure (classified as critical infrastructure by DHS), safeguard viewers’ personal information, and maintain trust in the broadcasting industry. The evolving threat agent landscape further complicates the cybersecurity presence in broadcasting. As AI-driven technologies become integral to media operations, they become attractive targets for malicious actors. Cyberattacks on media organizations, including ransomware, data breaches, and content manipulation, have surged recently. In conclusion, the convergence of AI, Cybersecurity, and Broadcasting is reshaping the media ecosystem. AI-powered content creation and distribution offer new creative possibilities and business models, while cybersecurity becomes paramount to protect against emerging threats.

    Henry McKelvey | One Media Technologies | Hunt Valley, Md., United States



  • Next-Generation Token to Fight Piracy and CDN Leeching - $15

    Date: April 3, 2024
    Topics: ,

    Content Delivery Networks (CDNs) are widely used to stream video efficiently across the Internet, but they face persistent challenges from unauthorized access attempts and content piracy, a phenomenon known as CDN leeching. Traditional token-based authentication mechanisms, often relying on long-lived tokens with fixed expiration times, have proven inadequate in addressing these security threats. In response, we propose a novel randomized token rejection mechanism to bolster the security of CDN architectures against unauthorized access attempts. By dynamically adjusting rejection probabilities based on token properties and operational policies, our mechanism enhances CDN resilience while minimizing operational overhead. Furthermore, we present refinements to our approach, including geographic probability of rejection, content-sensitivity, and frequency analysis, to tailor security policies to specific content access patterns. Evaluation results demonstrate the efficacy of our randomized token rejection mechanism in mitigating piracy risks while maintaining operational efficiency. While further research is needed to implement fully transparent token renewal schemes, the current technologies, typically based on the Common Access Token (CAT), already enable the implementation of the randomized token rejection mechanism.

    Gwendal Simon | Synamedia | Rennes, France
    Gwenaël Doërr | Synamedia | Rennes, France