• Login
    View Item 
    •   KABU Repository Home
    • Conference, Seminars, Workshop and trainings.
    • Conference Papers
    • 4th Annual Conference Kabarak University 2014
    • View Item
    •   KABU Repository Home
    • Conference, Seminars, Workshop and trainings.
    • Conference Papers
    • 4th Annual Conference Kabarak University 2014
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    BLOCKBACKDOOR

    Thumbnail
    View/Open
    full article (120.8Kb)
    Date
    2014
    Author
    MBURU, SIMON M.
    NYAMWANGE, ALEX K.
    Metadata
    Show full item record
    Abstract
    A backdoor is an undocumented method of gaining access to a program or a computer by using another installed program that bypasses normal authentication. This paper deals specifically with hardware backdoors. These backdoors reside in the hardware components of a computer device and they are often very hard to detect using normal intrusion detection methods. Our research on the topic revealed that most hardware computer devices are either manufactured with backdoors within their circuits intentionally by the manufacturer or some vulnerability exists without the knowledge of the manufacturer. As hardware backdoors remain the most dangerous and undetected method used by information system intruders, it is as good as nothing if remote connections cannot be established to them. This paper will showcase how these backdoors work together on different devices in a 4 network system and the various methods that can be employment to curb the problem. This will ensure that whatever the number of backdoors residing in a device, they will be inaccessible to the intruder and remain harmless to the computer system or device. As Kenya anticipates digitalizing most of its systems for the realization of the Vision 2030, digital gadgets will be the order of the day and suppose they pose the risk of information security breach then a big problem lies ahead. The rapid embracement of digital devices, example vehicle speed governors, will most likely create an information security breach in communication systems since these devices could be potential targets.
    URI
    http://ir.kabarak.ac.ke/handle/123456789/1012
    Collections
    • 4th Annual Conference Kabarak University 2014 [31]

    Copyright © 2025 
    Kabarak University Libraries
    | Repository Policy | Send Feedback
     

    Browse

    All of KABU RepositoryCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsThis CollectionBy Issue DateAuthorsTitlesSubjects

    My Account

    LoginRegister

    Copyright © 2025 
    Kabarak University Libraries
    | Repository Policy | Send Feedback