dc.description.abstract | A backdoor is an undocumented method of gaining access to a program or a
computer by using another installed program that bypasses normal
authentication. This paper deals specifically with hardware backdoors. These
backdoors reside in the hardware components of a computer device and they
are often very hard to detect using normal intrusion detection methods. Our
research on the topic revealed that most hardware computer devices are
either manufactured with backdoors within their circuits intentionally by the
manufacturer or some vulnerability exists without the knowledge of the
manufacturer. As hardware backdoors remain the most dangerous and
undetected method used by information system intruders, it is as good as
nothing if remote connections cannot be established to them. This paper will
showcase how these backdoors work together on different devices in a
4
network system and the various methods that can be employment to curb the
problem. This will ensure that whatever the number of backdoors residing in
a device, they will be inaccessible to the intruder and remain harmless to the
computer system or device. As Kenya anticipates digitalizing most of its
systems for the realization of the Vision 2030, digital gadgets will be the
order of the day and suppose they pose the risk of information security
breach then a big problem lies ahead. The rapid embracement of digital
devices, example vehicle speed governors, will most likely create an
information security breach in communication systems since these devices
could be potential targets. | en_US |