Radio World Engineering Extra 250 - August 8, 2018

Page 1

BEAT THE HEAT

ENGINEERING EXTRA

|

In-Depth Technology for Radio Engineers

The author is assistant director of information technology of educational broadcast services at Texas A&M University; and the director of engineering for KAMU Public Radio and Television. He was the 2014 recipient of the Radio World Excellence in Engineering Award. This paper appears in the “Proceedings of the 2018 NAB Broadcast Engineering and Information Technology Conference” and is reprinted with permission of the National Association of Broadcasters. The broadcast technical plant today looks more like a data center. It is a data center as the industry migrates to an Information Technology (IT) infrastructure. It is essential for the broadcast

• Dead Air • Undesirable Program Content • Unavailable Resources • Loss of Revenue • Public Embarrassment •P otential Liability Broadcast engineers focus upon minimizing dead air or the loss of program content broadcast. Many of the security incidents that have occurred that are oriented towards the broadcast facility target the disruption of the program con-

D

C

engineer to understand network security, have the tools, and have the knowledge to implement a secure network environment within his or her broadcast facility. Security risks to the broadcast facility can be far-ranging and includes undesired conditions (see reference [1] at the end of this article) such as:

Contact Us Today to Learn More 1-800-237-1776 | www.comrex.com

IP Network Security Availability Denial

Fig. 1: The CIA triad.

tent. These incidents typically replace the desired program content with an alternate content source that is undesirable. When commercial messages are not broadcast, a loss of revenue occurs and in all cases, the broadcaster faces embarrassment as their program content may be drastically different than their normal content for which they are known. Implementation of strong cybersecurity provisions is as important as redundant systems and active preventative maintenance programs to insure reliable broadcast operations. Cybersecurity is the protection of computers, networks, application programs and data from change, destruction or unauthorized change [2]. Cybersecurity encompasses a diverse environment of attacks, compromises and

Guest Interviews with no bleed Don’t haveAd to be Complicated. Quality Interviews, Simple Setup.

RADIOWORLD.COM

n tio ra ty te gri e

BY WAYNE M. PECENA

|

t In

Minimize network compromise by following industry best practices

$5.00

Al

My Broadcast Plant Network Is Secure — Is Yours?

|

on isc fid los en ur tia e lty

AUGUST 8, 2018

John Marcon shares tips on how to keep your transmitter cool. Page 18

countermeasures. The National Cybersecurity Federally Funded Research and Development Center (National Cybersecurity FFRDC) conducts research into cybersecurity measures and maintains a national database of threat vulnerabilities. The development of best practices for industry is a major product of this federal effort. Cybersecurity events share a common chain or sequence of events as follows [2]: • Host Probing / Network Exploration • Gain Host Access • Host Right/Privilege Modification • Add “Backdoor” Access •C ompromise Host • Cover Up Actions

- 9.25” x 2.25”

(continued on page 6)


Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.
Radio World Engineering Extra 250 - August 8, 2018 by publications - Issuu