This page uses JavaScript and requires a JavaScript enabled browser.Your browser is not JavaScript enabled.
مرکز و کتابخانه مطالعات اسلامی به زبان های اروپایی
منو
درگاههای جستجو
مدارک
جستجوی پیشرفته
مرور
جستجو در سایر کتابخانه ها
مستندات
جستجوی پیشرفته
مرور
منابع دیجیتال
تمام متن
اصطلاحنامه
درختواره
پرسش و پاسخ
سوالات متداول
پرسش از کتابدار
پیگیری پرسش
ورود
ثبت نام
راهنما
خطا
رکورد قبلی
رکورد بعدی
"
Setting the Standard:
"
Stanley, Jacob
Riddell, Christopher
Document Type
:
Latin Dissertation
Language of Document
:
English
Record Number
:
1106085
Doc. No
:
TLpq2369871406
Main Entry
:
Riddell, Christopher
:
Stanley, Jacob
Title & Author
:
Setting the Standard:\ Stanley, JacobRiddell, Christopher
College
:
Utica College
Date
:
2019
student score
:
2019
Degree
:
M.S.
Page No
:
48
Abstract
:
Hackers and malicious actors are exploiting embedded software devices connected to military-based networks to cause physical world damage and steal sensitive information. The firmware operating these machines is susceptible to a myriad of exploits due to a lack of programmed security. Hackers target these devices because the firmware resides in the device’s ROM, allowing attacks to go for an extended period without being discovered. Under the current DoD IoE policies, U.S. military branches face exposure to cyber-vulnerabilities. Militant Shiites and Afghanistan were accessing Predator Drone feed using a Russian software tool (Mount & Quijano, 2009). Civilians were able to trace out the perimeters and locations of some of the U.S. military's most secret bases using information gathered by activity trackers (Montalbano, 2018). A report by the Government Accountability Office highlighted three exploits through IoE and M2M that could cause physical damage to military bases (U.S. GAO, 2017). The vulnerabilities of firmware and the impact it has on U.S. military networks has made it a target for opposing groups. Currently, the vetting process implemented by the DoD has fallen short of preventing data breaches. The current standards must allow military branches to influence programmable security during the acquisition stage. Further, a Risk Management Framework should be required by the DoD for each military branch's device utilization. Without proper legislation and vetting standards, the IoE and M2M machines will continue to be a massive vulnerability exploited by attackers with less militant capabilities.
Subject
:
Computer engineering
:
Computer science
:
Information technology
https://lib.clisel.com/site/catalogue/1106085
کپی لینک
پیشنهاد خرید
پیوستها
عنوان :
نام فایل :
نوع عام محتوا :
نوع ماده :
فرمت :
سایز :
عرض :
طول :
2369871406_12419.pdf
2369871406.pdf
پایان نامه لاتین
متن
application/pdf
469.04 KB
85
85
نمایش
نظرسنجی
نظرسنجی منابع دیجیتال
1 - آیا از کیفیت منابع دیجیتال راضی هستید؟
X
کم
متوسط
زیاد
ذخیره
پاک کن