Content Protection Network
   HOME

TheInfoList



OR:

A content protection network (also called content protection system or web content protection) is a term for anti-
web scraping Web scraping, web harvesting, or web data extraction is data scraping used for data extraction, extracting data from websites. Web scraping software may directly access the World Wide Web using the Hypertext Transfer Protocol or a web browser. W ...
services provided through a
cloud infrastructure Cloud computing is "a paradigm for enabling network access to a scalable and elastic pool of shareable physical or virtual resources with self-service provisioning and administration on-demand," according to ISO. Essential characteristics ...
. A content protection network is claimed to be a technology that protects websites from unwanted web scraping,
web harvesting Web scraping, web harvesting, or web data extraction is data scraping used for extracting data from websites. Web scraping software may directly access the World Wide Web using the Hypertext Transfer Protocol or a web browser. While web scrapin ...
,
blog scraping Web scraping, web harvesting, or web data extraction is data scraping used for extracting data from websites. Web scraping software may directly access the World Wide Web using the Hypertext Transfer Protocol or a web browser. While web scrapin ...
, data harvesting, and other forms of access to data published through the
World Wide Web The World Wide Web (WWW or simply the Web) is an information system that enables Content (media), content sharing over the Internet through user-friendly ways meant to appeal to users beyond Information technology, IT specialists and hobbyis ...
. A good content protection network will use various algorithms, checks, and validations to distinguish between desirable search engine
web crawler Web crawler, sometimes called a spider or spiderbot and often shortened to crawler, is an Internet bot that systematically browses the World Wide Web and that is typically operated by search engines for the purpose of Web indexing (''web spider ...
s and human beings on the one hand, and
Internet bot An Internet bot, web robot, robot, or simply bot, is a software application that runs automated tasks ( scripts) on the Internet, usually with the intent to imitate human activity, such as messaging, on a large scale. An Internet bot plays the ...
s and automated agents that perform unwanted access on the other hand. A few web application firewalls have begun to implement limited bot detection capabilities.


History

The protection of copyrighted content has a long tradition, but technical tricks and mechanisms are more recent developments. For example,
map A map is a symbolic depiction of interrelationships, commonly spatial, between things within a space. A map may be annotated with text and graphics. Like any graphic, a map may be fixed to paper or other durable media, or may be displayed on ...
s have sometimes been drawn with deliberate mistakes to protect the authors' copyright if someone else copies the map without permission. In 1998, a system called ''SiteShield'' eased the fears of theft and illicit re-use expressed by content providers who publish copyright-protected images on their websites. A research report published in November 2000 by
IBM International Business Machines Corporation (using the trademark IBM), nicknamed Big Blue, is an American Multinational corporation, multinational technology company headquartered in Armonk, New York, and present in over 175 countries. It is ...
was one of the first to document a working system for web content protection, called ''WebGuard''. Around 2002, several companies in the music recording industry had been issuing non-standard
compact disc The compact disc (CD) is a Digital media, digital optical disc data storage format co-developed by Philips and Sony to store and play digital audio recordings. It employs the Compact Disc Digital Audio (CD-DA) standard and was capable of hol ...
s with deliberate errors burned into them, as copy protection measures.
Google Google LLC (, ) is an American multinational corporation and technology company focusing on online advertising, search engine technology, cloud computing, computer software, quantum computing, e-commerce, consumer electronics, and artificial ...
also notably installed an automated system to help detect and block
YouTube YouTube is an American social media and online video sharing platform owned by Google. YouTube was founded on February 14, 2005, by Steve Chen, Chad Hurley, and Jawed Karim who were three former employees of PayPal. Headquartered in ...
video uploads with content that entail
copyright infringement Copyright infringement (at times referred to as piracy) is the use of Copyright#Scope, works protected by copyright without permission for a usage where such permission is required, thereby infringing certain exclusive rights granted to the c ...
. However, as individuals and enterprises engaged in
computer crime Cybercrime encompasses a wide range of criminal activities that are carried out using digital devices and/or networks. It has been variously defined as "a crime committed on a computer network, especially the Internet"; Cybercriminals may exp ...
have become more skilled and sophisticated, they erode the effectiveness of established perimeter-based security controls. The response is more pervasive use of data encryption technologies.
Forrester Research Forrester Research, Inc. is a research and advisory firm. Forrester serves clients in North America, Europe, and Asia Pacific. The firm is headquartered in Cambridge, Massachusetts, Cambridge, MA with global offices in Amsterdam, London, New D ...
asserted in 2011 that there is an industry-wide "drive toward consolidated content security platforms", and they predict in 2012 that "proliferating malware threats will require better threat intelligence". Forrester also asserts that content protection networks (especially in the form of
software as a service Software as a service (SaaS ) is a cloud computing service model where the provider offers use of application software to a client and manages all needed physical and software resources. SaaS is usually accessed via a web application. Unlike o ...
, or SaaS) enable companies to protect against both e-mail and web-borne theft of content. In some web applications, security is defined by URL patterns that identify protected content. For example, using the web.xml security-constraint element, content could be assigned values of NONE, INTEGRAL, and CONFIDENTIAL to describe the necessary transport guarantees.


See also

*
Digital rights management Digital rights management (DRM) is the management of legal access to digital content. Various tools or technological protection measures, such as access control technologies, can restrict the use of proprietary hardware and copyrighted works. DRM ...
*
Internet security Internet security is a branch of computer security. It encompasses the Internet, browser security, web site security, and network security as it applies to other applications or operating systems as a whole. Its objective is to establish rules ...
*
Web harvesting Web scraping, web harvesting, or web data extraction is data scraping used for extracting data from websites. Web scraping software may directly access the World Wide Web using the Hypertext Transfer Protocol or a web browser. While web scrapin ...
*
Web scraping Web scraping, web harvesting, or web data extraction is data scraping used for data extraction, extracting data from websites. Web scraping software may directly access the World Wide Web using the Hypertext Transfer Protocol or a web browser. W ...


References

{{Reflist Internet terminology Web technology