Analysis and Security Evaluation of Security Threat on Broadcasting Service

Jong Han Lee, Seung-Joo Kim

Research output: Contribution to journalArticle

Abstract

This paper defines and maps all possible threats to broadcasting services. Viewers currently use various types of broadcasting services—including cable TV, IPTV, and mobile TV, among others—and broadcast business operators are now developing the appropriate security mechanisms for each medium to safely and reliably provide broadcasting services to their audiences. Unlike mobile TV, which uses of a public network as in an over-the-top configuration, cable TV and IPTV are basically closed networks in terms of network security. However, they also link with external networks to provide additional services (bidirectional services or commerce-related services). Therefore, broadcast business operators of with various types of broadcast media are susceptible to security threats from which their broadcasting services may come to a halt or may be abused by hackers, such as with well-developed APT attacks, as well as other common external attacks. The common vulnerability scoring system for IT security is used to conduct a quantitative evaluation of the risk to security threats for broadcasting services. We also derive the results of a penetration test for the STB through the results presented with respect to a security threat. This result will help address potential security vulnerabilities in broadcasting services.

Original languageEnglish
Pages (from-to)1-21
Number of pages21
JournalWireless Personal Communications
DOIs
Publication statusAccepted/In press - 2017 Mar 2

Fingerprint

Broadcasting
IPTV
Cables
Network security
Industry

Keywords

  • Broadcasting service
  • CVSS
  • Security
  • Security evaluation
  • Threat

ASJC Scopus subject areas

  • Computer Science Applications
  • Electrical and Electronic Engineering

Cite this

Analysis and Security Evaluation of Security Threat on Broadcasting Service. / Lee, Jong Han; Kim, Seung-Joo.

In: Wireless Personal Communications, 02.03.2017, p. 1-21.

Research output: Contribution to journalArticle

@article{a5ea18e99f9a46b3b406e8c6231030b4,
title = "Analysis and Security Evaluation of Security Threat on Broadcasting Service",
abstract = "This paper defines and maps all possible threats to broadcasting services. Viewers currently use various types of broadcasting services—including cable TV, IPTV, and mobile TV, among others—and broadcast business operators are now developing the appropriate security mechanisms for each medium to safely and reliably provide broadcasting services to their audiences. Unlike mobile TV, which uses of a public network as in an over-the-top configuration, cable TV and IPTV are basically closed networks in terms of network security. However, they also link with external networks to provide additional services (bidirectional services or commerce-related services). Therefore, broadcast business operators of with various types of broadcast media are susceptible to security threats from which their broadcasting services may come to a halt or may be abused by hackers, such as with well-developed APT attacks, as well as other common external attacks. The common vulnerability scoring system for IT security is used to conduct a quantitative evaluation of the risk to security threats for broadcasting services. We also derive the results of a penetration test for the STB through the results presented with respect to a security threat. This result will help address potential security vulnerabilities in broadcasting services.",
keywords = "Broadcasting service, CVSS, Security, Security evaluation, Threat",
author = "Lee, {Jong Han} and Seung-Joo Kim",
year = "2017",
month = "3",
day = "2",
doi = "10.1007/s11277-017-4056-z",
language = "English",
pages = "1--21",
journal = "Wireless Personal Communications",
issn = "0929-6212",
publisher = "Springer Netherlands",

}

TY - JOUR

T1 - Analysis and Security Evaluation of Security Threat on Broadcasting Service

AU - Lee, Jong Han

AU - Kim, Seung-Joo

PY - 2017/3/2

Y1 - 2017/3/2

N2 - This paper defines and maps all possible threats to broadcasting services. Viewers currently use various types of broadcasting services—including cable TV, IPTV, and mobile TV, among others—and broadcast business operators are now developing the appropriate security mechanisms for each medium to safely and reliably provide broadcasting services to their audiences. Unlike mobile TV, which uses of a public network as in an over-the-top configuration, cable TV and IPTV are basically closed networks in terms of network security. However, they also link with external networks to provide additional services (bidirectional services or commerce-related services). Therefore, broadcast business operators of with various types of broadcast media are susceptible to security threats from which their broadcasting services may come to a halt or may be abused by hackers, such as with well-developed APT attacks, as well as other common external attacks. The common vulnerability scoring system for IT security is used to conduct a quantitative evaluation of the risk to security threats for broadcasting services. We also derive the results of a penetration test for the STB through the results presented with respect to a security threat. This result will help address potential security vulnerabilities in broadcasting services.

AB - This paper defines and maps all possible threats to broadcasting services. Viewers currently use various types of broadcasting services—including cable TV, IPTV, and mobile TV, among others—and broadcast business operators are now developing the appropriate security mechanisms for each medium to safely and reliably provide broadcasting services to their audiences. Unlike mobile TV, which uses of a public network as in an over-the-top configuration, cable TV and IPTV are basically closed networks in terms of network security. However, they also link with external networks to provide additional services (bidirectional services or commerce-related services). Therefore, broadcast business operators of with various types of broadcast media are susceptible to security threats from which their broadcasting services may come to a halt or may be abused by hackers, such as with well-developed APT attacks, as well as other common external attacks. The common vulnerability scoring system for IT security is used to conduct a quantitative evaluation of the risk to security threats for broadcasting services. We also derive the results of a penetration test for the STB through the results presented with respect to a security threat. This result will help address potential security vulnerabilities in broadcasting services.

KW - Broadcasting service

KW - CVSS

KW - Security

KW - Security evaluation

KW - Threat

UR - http://www.scopus.com/inward/record.url?scp=85014071178&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85014071178&partnerID=8YFLogxK

U2 - 10.1007/s11277-017-4056-z

DO - 10.1007/s11277-017-4056-z

M3 - Article

AN - SCOPUS:85014071178

SP - 1

EP - 21

JO - Wireless Personal Communications

JF - Wireless Personal Communications

SN - 0929-6212

ER -