Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Hidden Backdoor.
~
Rodriguez, Fidel.
Linked to FindBook
Google Book
Amazon
博客來
Hidden Backdoor.
Record Type:
Electronic resources : Monograph/item
Title/Author:
Hidden Backdoor./
Author:
Rodriguez, Fidel.
Published:
Ann Arbor : ProQuest Dissertations & Theses, : 2019,
Description:
51 p.
Notes:
Source: Masters Abstracts International, Volume: 80-11.
Contained By:
Masters Abstracts International80-11.
Subject:
Computer Engineering. -
Online resource:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=13879816
ISBN:
9781392147399
Hidden Backdoor.
Rodriguez, Fidel.
Hidden Backdoor.
- Ann Arbor : ProQuest Dissertations & Theses, 2019 - 51 p.
Source: Masters Abstracts International, Volume: 80-11.
Thesis (M.S.)--Utica College, 2019.
This item must not be sold to any third party vendors.
The existence of hidden backdoors in companies' software whether installed deliberately or mandated by the government is an issue that neither the US Government nor companies want the public to know. Especially after it was revealed to the public in 2013 by Edward Snowden that both the US Government and private companies were keeping hidden backdoors that affect public safety and privacy (Kelly, 2015). Companies do not report any backdoors discovered since it may provoke a public relations scandal that can affect the company's reputation and its market share. The US Government, on the other hand, would want to keep their interactions with the companies as a secret due to national security concerns. This study aims at identifying whether private companies are compelled by the government to place backdoors in their technological systems. The data was obtained from legal cases and media leaks since most information had been sealed by the government and the Foreign Intelligence Surveillance Court (FISC). The findings from the study indicate that the US government compels companies in the private sectors to place hidden backdoors in their software and hardware for surveillance purposes. Yahoo is one example among many companies that have been compelled by the government to give them access to user data under the Protect America Act and other laws. Research indicates that hidden backdoors mostly affects the majority of unsuspecting people while the tech-savvy criminals avoid detection. This study recommends that the government should implement laws that protect the citizens and become more transparent. In addition, technological companies should not leave backdoors that make their customers vulnerable to attacks.
ISBN: 9781392147399Subjects--Topical Terms:
1567821
Computer Engineering.
Hidden Backdoor.
LDR
:02723nmm a2200325 4500
001
2263077
005
20191121114009.5
008
220629s2019 ||||||||||||||||| ||eng d
020
$a
9781392147399
035
$a
(MiAaPQ)AAI13879816
035
$a
(MiAaPQ)utica:11426
035
$a
AAI13879816
040
$a
MiAaPQ
$c
MiAaPQ
100
1
$a
Rodriguez, Fidel.
$3
3540155
245
1 0
$a
Hidden Backdoor.
260
1
$a
Ann Arbor :
$b
ProQuest Dissertations & Theses,
$c
2019
300
$a
51 p.
500
$a
Source: Masters Abstracts International, Volume: 80-11.
500
$a
Publisher info.: Dissertation/Thesis.
500
$a
Advisor: Giordano, Jaclyn;Morales, Ismael.
502
$a
Thesis (M.S.)--Utica College, 2019.
506
$a
This item must not be sold to any third party vendors.
520
$a
The existence of hidden backdoors in companies' software whether installed deliberately or mandated by the government is an issue that neither the US Government nor companies want the public to know. Especially after it was revealed to the public in 2013 by Edward Snowden that both the US Government and private companies were keeping hidden backdoors that affect public safety and privacy (Kelly, 2015). Companies do not report any backdoors discovered since it may provoke a public relations scandal that can affect the company's reputation and its market share. The US Government, on the other hand, would want to keep their interactions with the companies as a secret due to national security concerns. This study aims at identifying whether private companies are compelled by the government to place backdoors in their technological systems. The data was obtained from legal cases and media leaks since most information had been sealed by the government and the Foreign Intelligence Surveillance Court (FISC). The findings from the study indicate that the US government compels companies in the private sectors to place hidden backdoors in their software and hardware for surveillance purposes. Yahoo is one example among many companies that have been compelled by the government to give them access to user data under the Protect America Act and other laws. Research indicates that hidden backdoors mostly affects the majority of unsuspecting people while the tech-savvy criminals avoid detection. This study recommends that the government should implement laws that protect the citizens and become more transparent. In addition, technological companies should not leave backdoors that make their customers vulnerable to attacks.
590
$a
School code: 1754.
650
4
$a
Computer Engineering.
$3
1567821
650
4
$a
Computer science.
$3
523869
690
$a
0464
690
$a
0984
710
2
$a
Utica College.
$b
Cybersecurity.
$3
2098218
773
0
$t
Masters Abstracts International
$g
80-11.
790
$a
1754
791
$a
M.S.
792
$a
2019
793
$a
English
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=13879816
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9415311
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login