Let Your Fingers Do the Fighting: Pre-Acquisition Exploits - The Technology Crucible

被引:0
|
作者
Nugent, John [1 ]
机构
[1] Univ Dallas, Grad Sch Management, Irving, TX 75062 USA
关键词
Technology exploits; cybertrust; systrust; sas; 70; aicpa; common criteria; trojans;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper addresses a new form of information warfare in the form of a serious hidden technology exploitation that poses a fundamental risk to all users of IT, telecommunications, and other "powered" systems, and proffers approaches for dealing with such threats. Such challenges if left unaddressed, represent the ultimate form of warfare. Heretofore, IT and telecommunications professionals in particular have been concerned principally with "post acquisition" exploits from viruses, worms, Trojans, password hacking, rootkits, EMI/RFI attacks, etc. Such traditional threats have been deemed to be from outside the protected boundaries of the enterprise. However, today it is becoming apparent that a much more pernicious threat exists in the form of "pre-acquisition" hidden exploits, exploits embedded in the product prior to acquisition, against which most are ill prepared to defend themselves. Such exploits represent the ultimate "Trojan Horse" attack in that the users themselves bring the compromised equipment into the protected boundaries of the enterprise thereby compromising traditional protections provided by authentication, access, and firewall defenses. And with numerous state organs apparently working with the manufacturers in their respective countries, the exploitation of other nation states and the enterprises within those states is real and substantive. These "pre-acquisition" technology exploits are examined and approaches are proffered to help in mitigating such challenges and risks.
引用
收藏
页码:77 / 84
页数:8
相关论文
共 38 条
  • [31] Let your fingers do the walking: A simple spectral signature model for "remote" fossil prospecting
    Conroy, Glenn C.
    Emerson, Charles W.
    Anemone, Robert L.
    Townsend, K. E. Beth
    JOURNAL OF HUMAN EVOLUTION, 2012, 63 (01) : 79 - 84
  • [32] Let your fingers do the talking: Passive typing instability predicts future mood outcomes
    Stange, Jonathan P.
    Zulueta, John
    Langenecker, Scott A.
    Ryan, Kelly A.
    Piscitello, Andrea
    Duffecy, Jenna
    McInnis, Melvin G.
    Nelson, Pete
    Ajilore, Olusola
    Leow, Alex
    BIPOLAR DISORDERS, 2018, 20 (03) : 285 - 288
  • [33] Let your fingers do the walking: Finger force distinguishes competing accounts of the congruency sequence effect
    Daniel H. Weissman
    Psychonomic Bulletin & Review, 2019, 26 : 1619 - 1626
  • [34] Let your fingers do the walking: A simple spectral signature model for "remote" fossil prospecting.
    Conroy, Glenn C.
    Emerson, Charles W.
    Anemone, Robert L.
    Townsend, Beth
    AMERICAN JOURNAL OF PHYSICAL ANTHROPOLOGY, 2013, 150 : 101 - 101
  • [35] LET YOUR FINGERS DO THE WALKING - A GUIDE TO INFORMATION-SOURCES ABOUT CD-ROM
    KING, A
    DATABASE, 1991, 14 (04): : 97 - 99
  • [36] Let your fingers do the walking: Finger force distinguishes competing accounts of the congruency sequence effect
    Weissman, Daniel H.
    PSYCHONOMIC BULLETIN & REVIEW, 2019, 26 (05) : 1619 - 1626
  • [37] Let Your Fingers Do the Talking: Students' Social Distance as Revealed Through Cell Phone Contact Lists
    Randall, Nancy Horak
    SOCIOLOGICAL SPECTRUM, 2014, 34 (02) : 136 - 142
  • [38] Let Your Fingers do the Walking: A Unified Approach for Efficient Short-, Medium-, and Long-Distance Travel in VR
    Yan, Zhixin
    Lindeman, Robert W.
    Dey, Arindam
    2016 IEEE SYMPOSIUM ON 3D USER INTERFACES (3DUI), 2016, : 27 - 30