語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Hidden Backdoor.
~
Rodriguez, Fidel.
FindBook
Google Book
Amazon
博客來
Hidden Backdoor.
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Hidden Backdoor./
作者:
Rodriguez, Fidel.
出版者:
Ann Arbor : ProQuest Dissertations & Theses, : 2019,
面頁冊數:
51 p.
附註:
Source: Masters Abstracts International, Volume: 80-11.
Contained By:
Masters Abstracts International80-11.
標題:
Computer Engineering. -
電子資源:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=13879816
ISBN:
9781392147399
Hidden Backdoor.
Rodriguez, Fidel.
Hidden Backdoor.
- Ann Arbor : ProQuest Dissertations & Theses, 2019 - 51 p.
Source: Masters Abstracts International, Volume: 80-11.
Thesis (M.S.)--Utica College, 2019.
This item must not be sold to any third party vendors.
The existence of hidden backdoors in companies' software whether installed deliberately or mandated by the government is an issue that neither the US Government nor companies want the public to know. Especially after it was revealed to the public in 2013 by Edward Snowden that both the US Government and private companies were keeping hidden backdoors that affect public safety and privacy (Kelly, 2015). Companies do not report any backdoors discovered since it may provoke a public relations scandal that can affect the company's reputation and its market share. The US Government, on the other hand, would want to keep their interactions with the companies as a secret due to national security concerns. This study aims at identifying whether private companies are compelled by the government to place backdoors in their technological systems. The data was obtained from legal cases and media leaks since most information had been sealed by the government and the Foreign Intelligence Surveillance Court (FISC). The findings from the study indicate that the US government compels companies in the private sectors to place hidden backdoors in their software and hardware for surveillance purposes. Yahoo is one example among many companies that have been compelled by the government to give them access to user data under the Protect America Act and other laws. Research indicates that hidden backdoors mostly affects the majority of unsuspecting people while the tech-savvy criminals avoid detection. This study recommends that the government should implement laws that protect the citizens and become more transparent. In addition, technological companies should not leave backdoors that make their customers vulnerable to attacks.
ISBN: 9781392147399Subjects--Topical Terms:
1567821
Computer Engineering.
Hidden Backdoor.
LDR
:02723nmm a2200325 4500
001
2263077
005
20191121114009.5
008
220629s2019 ||||||||||||||||| ||eng d
020
$a
9781392147399
035
$a
(MiAaPQ)AAI13879816
035
$a
(MiAaPQ)utica:11426
035
$a
AAI13879816
040
$a
MiAaPQ
$c
MiAaPQ
100
1
$a
Rodriguez, Fidel.
$3
3540155
245
1 0
$a
Hidden Backdoor.
260
1
$a
Ann Arbor :
$b
ProQuest Dissertations & Theses,
$c
2019
300
$a
51 p.
500
$a
Source: Masters Abstracts International, Volume: 80-11.
500
$a
Publisher info.: Dissertation/Thesis.
500
$a
Advisor: Giordano, Jaclyn;Morales, Ismael.
502
$a
Thesis (M.S.)--Utica College, 2019.
506
$a
This item must not be sold to any third party vendors.
520
$a
The existence of hidden backdoors in companies' software whether installed deliberately or mandated by the government is an issue that neither the US Government nor companies want the public to know. Especially after it was revealed to the public in 2013 by Edward Snowden that both the US Government and private companies were keeping hidden backdoors that affect public safety and privacy (Kelly, 2015). Companies do not report any backdoors discovered since it may provoke a public relations scandal that can affect the company's reputation and its market share. The US Government, on the other hand, would want to keep their interactions with the companies as a secret due to national security concerns. This study aims at identifying whether private companies are compelled by the government to place backdoors in their technological systems. The data was obtained from legal cases and media leaks since most information had been sealed by the government and the Foreign Intelligence Surveillance Court (FISC). The findings from the study indicate that the US government compels companies in the private sectors to place hidden backdoors in their software and hardware for surveillance purposes. Yahoo is one example among many companies that have been compelled by the government to give them access to user data under the Protect America Act and other laws. Research indicates that hidden backdoors mostly affects the majority of unsuspecting people while the tech-savvy criminals avoid detection. This study recommends that the government should implement laws that protect the citizens and become more transparent. In addition, technological companies should not leave backdoors that make their customers vulnerable to attacks.
590
$a
School code: 1754.
650
4
$a
Computer Engineering.
$3
1567821
650
4
$a
Computer science.
$3
523869
690
$a
0464
690
$a
0984
710
2
$a
Utica College.
$b
Cybersecurity.
$3
2098218
773
0
$t
Masters Abstracts International
$g
80-11.
790
$a
1754
791
$a
M.S.
792
$a
2019
793
$a
English
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=13879816
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9415311
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入