This is an old revision of this page, as edited by Prelude after noon (talk | contribs) at 21:33, 7 March 2012 (finishing up for now, removing "in use" template). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.
Revision as of 21:33, 7 March 2012 by Prelude after noon (talk | contribs) (finishing up for now, removing "in use" template)(diff) ← Previous revision | Latest revision (diff) | Newer revision → (diff)A content protection network (also called content protection system or web content protection) is a technology that protects websites from unwanted web scraping, web harvesting, blog scraping, data harvesting, and other forms of malicious and intentional content theft. A good content protection network will use various algorithms, checks, and validations to distinguish between desirable search engine web crawlers and human beings on the one hand, and malicious Internet bots and automated agents that seek to violate copyright on the other hand.
Commercial services that include elements of content protection networks include Distil and Incapsula. A few web application firewalls have begun to implement limited bot detection capabilities as well.
History
The protection of copyrighted content has a long tradition, but technical tricks and mechanisms are more recent developments. For example, maps havesometimes been drawn with deliberate mistakes to protect the authors' copyright if someone else copies the map without permission. In 1998, a system called SiteShield eased the fears of theft and illicit re-use expressed by content providers who publish copyright-protected images on their websites. A research report published in November 2000 by IBM was one of the first to document a working system for web content protection, called WebGuard.
Around 2002, several companies in the music recording industry had been issuing Compact Discs with deliberate errors burned into them, to thwart copying and piracy. Google also notably installed an automated system to help detect and block YouTube video uploads that violate copyright.
However, as individuals and enterprises engaged in computer crime have become more skilled and sophisticated, they erode the effectiveness of established perimeter-based security controls. The response is more pervasive use of data encryption technologies. Forrester Research asserted in 2011 that there is an industry-wide "drive toward consolidated content security platforms", and they predict in 2012 that "proliferating malware threats will require better threat intelligence". Forrester also asserts that content protection networks (especially in the form of software as a service, or SaaS) enable companies to protect against both e-mail and web-borne theft of content. In some web applications, security is defined by URL patterns that identify protected content. For example, using the web.xml security-constraint element, content could be assigned values of NONE, INTEGRAL, and CONFIDENTIAL to describe the necessary transport guarantees.
See also
References
- "Why a map is a window on to history". BBC News Magazine. Retrieved 7 March 2012.
- Kuester, Jeffrey; Nieves, Peter (1998). "Hyperlinks, Frames and Metatags: An Intellectual Property Analysis". IDEA: The Journal of Law and Technology. 38 (243). Retrieved 7 March 2012.
- "WebGuard: A System for Web Content Protection" (PDF). IBM Research Division. Retrieved 7 March 2012.
- Paul Boutin (04 February 2002). "Philips Burning on Protection". Wired. Retrieved 7 March 2012.
{{cite news}}
: Check date values in:|date=
(help) - Miguel Helft (23 June 2010). "Judge Sides With Google in Viacom Video Suit". The New York Times. Retrieved 7 March 2012.
- "Killing Data In The Future, Encryption Will Become The Cornerstone Of Your Data Security And Privacy Strategy". Forrester Research. Retrieved 7 March 2012.
- Holland, Rick. "The Content Security Forecast Calls For Clouds". Forrester Research. Retrieved 7 March 2012.
- "Market Overview: Content Security, Q32011". Forrester Research. Retrieved 7 March 2012.
{{cite web}}
:|first=
missing|last=
(help); Missing pipe in:|first=
(help) - "Web Content Security Constraints". Jboss.org. Retrieved 7 March 2012.