Quickflix is a DVD rental company, as it said, it is the leading online DVD rental operator in Australia. It allows members to select DVDs from an online library of movie, TV series and music titles and have them delivered through the mail. Members pay a monthly fee regardless of how many DVDs they rent or how long they keep each title. Here is the website www.quickflix.com.au
What assets might an attacker want to acquire from this target?
Physical Goods
As a DVD rental company, the most valuable assets of Quickflix are its physical goods, the DVDs. These plastic chips are storing in Quickflix's warehouse, and will be delivered by POST once it has been put on the list.
Service Availability
The other kind of assets is the service availability. This can be seperated into two aspect.
The first one is the safety of Quickflix's website. Generally, all interaction between Quickflix and renters takes place through the company's website. Once the website is down, all services to users become unavailable. They can not sign up, or browse and order DVD anymore. If that really happy, the lost could be huge. Another possibility is running out of inventory. Imaging that all copies of some heat movies being rent out and no spare one available. This will strike the confident of users to the company and may lead to a losing of customers.
Customer Information
Users information on Quickflix could be the assets wanted by an attacker.Membership System is implemented on Quickflix, users need to become a member before enjoying the DVD rental services. When new user signing up, personal information such as name, address, and creditcard details will be required by registration system. That suggests the company may probably storing ...
... middle of paper ...
...//www.selfseo.com/
Method: Google searching
Information 5: May be the email address of administrator of quickflix. simon@quickflix.com.au
Source: http://www.who.is/website-information/quickflix.com.au
Method: Google searching
Information 6: Vulnerability analysis report of quickflix
Web Server Uses Plain-Text Form Based Authentication
Web Server Internal IP Address/Internal Network Name Disclosure Vulnerability
AutoComplete Attribute Not Disabled for Password in Form Based Authentication
Web Server Internal IP Address/Internal Network Name Disclosure Vulnerability
AutoComplete Attribute Not Disabled for Password in Form Based Authentication
SSL Certificate - Subject Common Name Does Not Match Server FQDN
Works Cited
https://freescan3.qualys.com/report.php?hemna=QdzkWSgNlJvVvTj5Mq%2FA6zPB%2Bikgp%2BYX8zRwRwpgokH5EG8Ignv3KA%3D%3D
Redbox is an impressive business that provides a valuable service that allows it is consumers to rent movies in Blu-ray or regular DVD by paying a daily rate. The flourishing company is located on Batesville Road on the exterior of the CVS Pharmacy. The indication of a great movie renting service is on par movie availability and movie affordability. Redbox is an ideal amenity that thoroughly complies with both factors.
Most DVDs employ a method of encryption called Content Scrambling System (CSS). With CSS, each encrypted DVD contains a key that is used along with a key in the player in order to decrypt the contents of the DVD. The DVD Copy Control Association (DVDCCA), the CSS license holder, issues the key in the DVD player to licensed manufacturers of DVD players [2]. DeCSS uses a valid but unlicensed key to decrypt the DVD content.
After testing the market, redbox had directed their focus on new movie releases. “Redbox is America’s destination for movies and video games” (Media, 2014). With over 200 new release titles and 630 discs in each kiosk, Redbox rents out the latest new release movies on DVD or Blu-ray Disc and new release video games for all major game consoles, including Nintendo Wii...
Blockbuster’s strength has been great service, family values, and moderate pricing as opposed to East Coast Video. However, they are a fairly new company. Video City’s strategy is to control the adult film rental category and attract loyalty within these customers. Their website, however, offers only the sale of videos and does not provide information about the company’s history whereas Blockbuster takes pride in their socially responsible efforts. It’s very hard to avoid Blockbuster because of the availability of products, service, and convenience.
The movie rental industry is now moving from just DVD’s and getting into the streaming and movies on demand system which makes them to be marketable and have a firm corporate survival with profit maximization. By saying this, I believe this industry is a good industry to enter into using the right strategies to gain competitive advantage. With the use of business intelligence via effective CRM, the needs and preference of customers can be identified and capitalized on. This would enable movie rental industry to move from into a competitive advantage position by making available what customers are actually calling for and not what they think is good for the customers. An example would be the streaming of movies directly into customer homes which enables their service to be customer driven.
In the tangible section, there is a strong presence of financial, technical, and physical resources.
§ Emerging competition from digital cable and satellite companies that offer movies on demand. Time Warner digital cable offers video on demand library consisting of a few hundred selections and growing. Users can purchase a movie with the touch of a button for about $4.00. Customers have access to the movie for up to 24hours. Many video on demand services are now offering technologies that allow users to pause, fast forward and rewind the movies they purchase. Though the selection offered by cable companies is extremely small in comparison to Netflix, it will only be a matter of time before the number of selections will increase drastically.
Let’s take a movie you bought for example. With this new copyright scheme in place, in addition to the Blu-Ray disc, included would be a code for you or another to watch the movie online. There would be a set limit to how many times the code could be used, either by month or year. This would be similar to how people share a Netflix account, but it would come with a time limit.
Resource pooling: The examples of resources include storage, processing, memory, network bandwidth. By using multi tenancy model the service providers can provide services based on customer demands irrespective of different physical and virtual resources which were assigned and reassigned dynamically.
Xiong, J. X., Ibbotson, R. G., Idzorek, T. M., & Chen, P. (2010). The Equal Importance of Asset
Film Piracy, What is it? Australian Screen Association defines Film piracy as, “anyone viewing a full length movie via ‘unauthorised’ means, including: digital (downloading, streaming, digital transfer of pirated copies), physical (buying counterfeit/copied DVDs), and secondary (borrowing or viewing pirated copies).” Thanks to advancements in technology film piracy has been on the rise, making it easier to copy and distribute films worldwide with Australia being one of the highest contributors in the world to film piracy. This epidemic is having an affecting impact financially on Australian Film through economic consequences that the industry is now facing.
... intangible asset would have to be equipment. Without the necessary equipment the business would not be as profitable.
In today’s technology boom, the new waves of doing business have transformed the way people shop and live. The same happened the way people access personal entertainment. With Internet, people can stream movie online without have to go theater, or the rental movie box.
Evidently, the internet has revolutionized the society a great deal as far as communication is concerned. For example, information sharing is faster now; it is also easier to find information as compared to earlier on. Moreover, internet technology is undergoing incessant diversification.
The research topic chosen for this study is based on Digital Rights Management (DRM) and how it affects the stakeholders involved in digital purchases e.g. the content provider, the consumer etc. Current technologies and future trends in the areas of digital copyright security are also avenues of research that are pertinent to the topic.