Asia-Pacific Broadcasting (APB) August 2017 Volume 34, Issue 6 - Page 6

❝ Another way service providers can respond to the evolving threat environment is by learning to collaborate more closely and share intelligence about threats .❞
APB PANELLISTS
6 NEWS & VIEWS
August 2017

Cybersecurity for broadcast media organisations and professionals

by dr amal punchihewa
Cybersecurity is an increasingly important domain today . Cyber-attacks are increasing all the time , and they are becoming more sophisticated . Media organisations around the world , many of them leading service providers , are spending significant resources to combat cyber-attacks , and yet the number of attacks continues to rise .
Threats are also continuing to increase in both volume and sophistication . The impact is that countries across the world are concerned about breaches of cybersecurity , which could prejudicially impact their sovereignty and their national security . Consequently , cybersecurity law , as a discipline , has emerged .
This article aims to outline emerging issues around cybersecurity for media operations . How are certain terms defined in the discipline of cybersecurity ? What is the significance of cybersecurity and connected issues for media ? How significant is this new discipline of cybersecurity law likely to be in the coming times ? This article attempts to describe complicated technical issues connected with cybersecurity concerns of computer networks and computer systems used in media operations .
ABU activities
During the Asia-Pacific Broadcasting Union ( ABU ) Digital Broadcasting Symposium 2017 , the challenges and issues surrounding cyber attacks were discussed . The European Broadcasting Union ( EBU ), a sister union of ABU , shared the work it has done to educate and mitigate vulnerabilities due to cyber threats .
In my opinion , cybersecurity needs an approach which addresses three facets : people ( human resources ), organisation and infrastructure . The sense of urgency for cybersecurity has increased due to the emergence of IP everywhere in the media value chain .
Media professionals need to act swiftly as expanding globalisation and new business and business models involve changing global regulatory frameworks , greater sanctions and penalties , intense media and social media focus on privacy and security breaches , and the need for companies to protect IP from violating fundamental rights to privacy .
There are heightened concerns over cyber-attacks ; the need to balance privacy rights against the reporting of cyberattacks , intrusive technology accessing personal data , with new technology driving the importance of privacy considerations ( cloud , IoT ) and moves towards data sovereignty versus cross-border flows .
Various aspects must be addressed to understand vulnerabilities and attacks .
They are : n Distributed denial-of-service ( DDoS ) n Connected devices n Vendor system vulnerabilities n Malware attacks n Ransomware attacks n The cloud With Integrated Broadcast Broadband
( IBB ) systems and connected media devices , security may be loosely organised ( presenting vulnerabilities that are easy to attack ) and leaving room for simple attacks .
Some basics of cyber security for media
Malware can be defined as malicious software or a programme code designed to harm a computer or its data .
In August 2009 , attackers shut down Twitter for nearly three hours , leaving 44 million ‘ tweeters ’ worldwide out of touch . If that does not sound like a big deal , imagine broadcast services such as CNN or Fox News being driven off the air for an afternoon .
A bot network is a collection of remotely controlled bots . Hackers often use bot networks to launch attacks against other computers . Once a hacker has assembled a bunch of machines compromised with bots , the hacker has literally an army of “ bots ” that can be used to attack other machines . Frequently , the bots execute a denial-of-service ( DoS ) attack where so many compromised machines try to connect to a single website that the site itself crashes .
In this type of attack , the goal is to flood the target machine with data packets . The data transmitted is usually harmless in itself , but the large amount of traffic consumes the target machine ’ s bandwidth . In using up the Internet resources available to the target machine , it is prevented from being able to communicate properly . The end-result is the same in all cases . Legitimate users are denied service because of all the bogus traffic .
EBU recommendations The EBU has published five recommendations and is currently working on its

❝ Another way service providers can respond to the evolving threat environment is by learning to collaborate more closely and share intelligence about threats .❞

sixth recommendation on cloud security . The first five published recommendations address the following areas and can be downloaded on the EBU website : n R141 – Mitigation of distributed denial-of-service ( DDoS ) attacks – A DDoS attack occurs when multiple systems flood the bandwidth or resources of a targeted system , usually one or more Web servers . Such an attack is often the result of multiple compromised systems ( for example , a botnet ) flooding the targeted system with traffic . n R142 – Cybersecurity on Connected TVs n R143 – Cybersecurity for media vendor systems , software and services n R144 – Cybersecurity governance for media companies n R145 – Mitigating ransomware and malware attacks n R146 – The cloud security recommendation will cover the different perspectives of cloud , including :
• Procedural considerations , including procurement and the definition of business requirements .
• Service architectural considerations , including the description of cloud delivery models and overview of “ shared responsibilities ”, and the required security functionalities to meet security needs ( cloud WAF , cloud networking , cloud hardening , cloud identity management and so on ), as well as best practices .
• An approach for performing a cloud service provider assessment including linkage to existing assessments , data privacy limitations and the impact of existing certifications .
WBU-TC activities
The World Broadcasting Union technical committee ( WBU-TC ) has been working on pooling knowledge and learning to propose best practices , share information on vulnerabilities and make recommendations to media organisations and professionals . It also informs vendors that they also have a responsivity , as future systems
Christopher Slaughter
CEO CASBAA

APB PANELLISTS

Graham Stephens CTO Media City Development , Malaysia will be mainly software-defined .
Actions to mitigate We can carry out various actions to mitigate possible damage due to cyberattacks , of which the following are fundamental : n Security Standards n Best Practices n Governance n Recommendations However , training staff on procedures and increasing the number of security professionals may not be enough to redress the balance , given the prevalence and the nature of emerging attacks , many of which are automated and require automated responses . Service providers and other organisations are turning to technology to deliver such responses , using encryption and sandboxing technologies to protect data from intrusions , and ultimately from data losses .
Sandboxing is often used as a defence against email-borne threats , and offers an isolated environment where suspicious code can be tested and observed . Encryption is the most effective way of protecting data , but just under half of all online traffic is encrypted , partly due to issues concerning authentication .
Collaboration is a key approach , and another way service providers can respond to the evolving threat environment is by learning to collaborate more closely and share intelligence about threats .
In design and architecture , it is required to make clear boundaries between production areas and general office networks . This becomes harder to manage when operations are moved to the public cloud as clear isolation is not possible — the workflows need to be isolated using cybersecurity layers .
Dr Amal Punchihewa is Director , Technology & Innovation , Asia-Pacific Broadcasting Union , and Vice-Chair , World Broadcasting Union , Technical Committee . He is also an APB panellist .
Goh Kim Soon Senior Vice-President Broadcast Engineering Mediacorp
Shad Hashmi
Vice-President , Digital Development , Global Markets & Operations , BBC Worldwide Asia
6 NEWS & VIEWS August 2017 Cybersecurity for broadcast media organisations and professionals ❝ Another way service providers can respond to the by dr amal punchihewa Cybersecurity is an increasingly important domain today. Cyber-attacks are increas- ing all the time, and they are becoming more sophisticated. Media organisations around the world, many of them leading service providers, are spending significant resources to combat cyber-attacks, and yet the number of attacks continues to rise. Threats are also continuing to increase in both volume and sophistication. The impact is that countries across the world are concerned about breaches of cyber- security, which could prejudicially impact their sovereignty and their national secu- rity. Consequently, cybersecurity law, as a discipline, has emerged. This article aims to outline emerging issues around cybersecurity for media operations. How are certain terms de- fined in the discipline of cybersecurity? What is the significance of cybersecurity and connected issues for media? How significant is this new discipline of cyber- security law likely to be in the coming times? This article attempts to describe complicated technical issues connected with cybersecurity concerns of computer networks and computer systems used in media operations. ABU activities During the Asia-Pacific Broadcasting Union (ABU) Digital Broadcasting Sym- posium 2017, the challenges and issues surrounding cyber attacks were discussed. The European Broadcast- ing Union (EBU), a sister union of ABU, shared the work it has done to educate and mitigate vulnerabilities due to cyber threats. In my opinion, cyber­ security needs an ap- proach which addresses three facets: people (human resources), organisation and infrastructure. The sense of urgency for cybersecurity has increased due to the emergence of IP everywhere in the media value chain. Media professionals need to act swiftly as expanding globalisation and new business and business models involve changing global regulatory frameworks, greater sanctions and penalties, intense media and social media focus on privacy and security breaches, and the need for companies to protect IP from violating fundamental rights to privacy. There are heightened concerns over cyber-attacks; the need to balance privacy rights against the reporting of cyber- attacks, intrusive technology accessing personal data, with new technology driv- ing the importance of privacy considera- tions (cloud, IoT) and moves towards data sovereignty versus cross-border flows. Various aspects must be addressed to understand vulnerabilities and attacks. evolving threat environment is by learning to collaborate more closely and share intelligence about threats. ❞ They are: n Distributed denial-of-service (DDoS) n Connected devices n Vendor system vulnerabilities n Malware attacks n Ransomware attacks n The cloud With Integrated Broadcast Broadband (IBB) systems and connected media de- vices, security may be loosely organised (presenting vulnerabilities that are easy to attack) and leaving room for simple attacks. Some basics of cyber security for media Malware can be defined as malicious software or a programme code designed to harm a computer or its data. In August 2009, attackers shut down Twitter for nearly three ̰٥)aݕѕϊdݽɱݥЁѽՍ)%ѡЁ́Ёͽչ)ɽЁ͕٥́Ս́ 98)ȁ9́ɥٕѡȁ)ѕɹ)Ёݽɬ́ѥɔ)ѕ䁍ɽ̸!́ѕ͔)Ёݽɭ́Ѽչх́)ѡȁѕ̸=ȁ̴́)͕չ́ɼ)͕ݥѠ̰ѡȁ́ѕɅ)ɵ䁽qϊtѡЁ͕Ѽд)хѡȁ̸ɕՕѱ䰁ѡ)ᕍє͕٥Lх)ݡɔͼ䁍ɽ͕)ѼЁѼͥݕͥєѡЁѡ)ͥє͕Ʌ̸͡)%ѡ́хѡ)ѼѡхɝЁݥѠф)̸QфɅ͵ѕ́Յ)ɵ͕́Ёѡɝչ)Ʌյ́ѡхɝЁe)ݥѠ%ͥѡ%ѕɹЁɔ)ͽɍ́مѼѡхɝЁ)́ɕٕѕɽѼչ)єɽɱ丁QɕձЁ́ѡͅ)̸͕1ѥє͕́ɔ)͕٥͔ѡ́Ʌ) Tɕѥ)Q T́Չٔ͡ɕ)ѥ́́ɕѱݽɭ)ͥѠɕѥՐ͕ɥ)QЁٔՉ͡ɕѥ)ɕ́ѡݥɕ́)ݹѡ Tݕͥє)$HăL5ѥѥɥѕ)͕٥Lх̃L)Lх́ݡձѥѕ)ѡݥѠȁɕͽɍ́)хɝѕѕՅ䁽ȁɔ])̸͕ٕMՍх́ѕѡɕձ)ձѥɽ͕ѕ̀)ᅵѹФѡхɝѕ)ѕݥѠɅ)$HȃL 剕͕ɥ䁽 ѕ)QY)$H̃L 剕͕ɥ䁙ȁ)ٕȁѕ̰ͽ݅ɔ͕٥)$HЃL 剕͕ɥ䁝ٕɹ)ȁ)$HԃL5ѥѥɅͽ݅ɔ)݅ɔх)$H؃LQՐ͕ɥɕ)ѥݥٕȁѡɕЁȴ)ѥٕ́ՐՑ+AɽɅͥɅѥ̰Ց)ɽɕЁѡѥͤ)́ɕեɕ̸+M٥ɍѕɅͥɅѥ̰)Ցѡ͍ɥѥՐٕ)ٕ́٥܁q͡ɕɕ)ͥѥϊtѡɕեɕ͕ɥ䁙չ)ѥѥ́ѼЁ͕ɥ䁹̀Ր)]ՐݽɭՐɑ)Րѥ䁵Ёͼ)ݕ́ЁɅѥ̸+ɽȁəɵՐ)͕٥ɽ٥ȁ͕͵ЁՑ)Ѽѥ͕͵̰фɥم)хѥ́ѡЁѥ)ѥѥ̸)] TQ ѥ٥ѥ)Q]ɱ ɽѥUѕ)ѕ] TQ ́ݽɭ)ݱɹѼ)ɽ͔ЁɅѥ̰͡ɔɵѥ)ձɅѥ́ɕ)ѥ́Ѽɝͅѥ́ɽ̴)̸ͥ%Ёͼɵٕ́́ѡЁѡ)ͼٔɕͥ٥䰁́ɔѕ)ݥͽ݅ɔ)ѥ́Ѽѥє)]䁽Ёمɥ́ѥ́Ѽ)ѥєͥՔѼ剕ȴ)х̰ݡѡݥɔո)х)$MɥMхɑ)$ ЁAɅѥ)$ٕɹ)$Iѥ)!ݕٕȰɅхɽɕ)ɕͥѡյȁ͕ɥ)ɽͥ́䁹Ё՝Ѽɔ)ɕ́ѡٕѡɕم)ѡɔɝх̰)䁽ݡɔѽѕɕեɔ)ѽѕɕ̸͕M٥ɽ٥)ѡȁɝͅѥ́ɔɹѼ)ѕѼٕȁՍɕ͕̰)ͥѥͅ᥹ѕ)́ѼɽѕЁфɽ̰ͥ)ձѥѕ䁙ɽф̸͕)M᥹́ѕ͕́)Ёɹѡɕ̰)ͽѕ٥ɽЁݡɔ)́ѕѕ͕ٕ)ѥ́ѡЁѥٔ݅䁽)ɽѕѥфЁЁչȁ)Ʌ́ѕѱ䁑ՔѼ)Օ́ɹѡѥѥ) Ʌѥ́䁅ɽ)ѡȁ͕݅٥ɽ٥́ɔ)Ѽѡٽ٥ѡɕЁ٥ɽ)́䁱ɹѼɅєɔ͕)͡ɔѕЁѡɕ̸)%ͥɍѕɔЁ́ɔ)եɕѼȁչɥ́ݕ)ɽՍѥɕ́Ʌд)ݽɭ̸Q́́ɑȁѼ)ݡɅѥ́ɔٕѼѡՉ)Ր́ȁͽѥ́ЁͥP)ѡݽɭ́Ѽͽѕͥ)剕͕ɥ䁱̸)ȁAչ݄́ɕѽȰQ)䀘%مѥͥA ɽѥ)UY Ȱ]ɱ ɽѥ)UQ ѕ!́ͼ)Aи)AA911%MQL) ɥѽ)M՝ѕ) <) M )ɅMѕ) Q<)5 )ٕа5ͥ)-M)M!͡)MȁYAɕͥ)YAɕͥа) ɽЁɥ)хٕа)5)5ɭ̀=Ʌѥ̰) ]ɱݥͥ