Osama Nasser, Shamis AlThuhli, Morshed Mohammed, Rashed AlMamari, F. Hajamohideen
{"title":"An investigation of backdoors implication to avoid regional security impediment","authors":"Osama Nasser, Shamis AlThuhli, Morshed Mohammed, Rashed AlMamari, F. Hajamohideen","doi":"10.1109/GCCT.2015.7342695","DOIUrl":null,"url":null,"abstract":"The remain undetected threat, backdoor is a computer based cryptosystem or an algorithm or the form of an installed program, it is a method of bypassing normal authentication, securing unauthorized remote access to a computer, hackers benefit obtaining access to plaintext and users' sensitive information. The research on Backdoor is keep vigorous as the day passes and more new threats have been detected. The victims are varying from the student inside the campus to an employee in a corporate office exposed to the threat. This field of research must be addressed in all part of information technology areas in terms of the type of backdoors such as Crypto, Systems and Application backdoors. This paper discusses the backdoors and its types also this study attempts to investigate the threat of backdoors using open source software. It illustrates the various countries including Oman that originate backdoors which census overall 2% of backdoors.","PeriodicalId":378174,"journal":{"name":"2015 Global Conference on Communication Technologies (GCCT)","volume":"31 Spec No 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 Global Conference on Communication Technologies (GCCT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/GCCT.2015.7342695","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
The remain undetected threat, backdoor is a computer based cryptosystem or an algorithm or the form of an installed program, it is a method of bypassing normal authentication, securing unauthorized remote access to a computer, hackers benefit obtaining access to plaintext and users' sensitive information. The research on Backdoor is keep vigorous as the day passes and more new threats have been detected. The victims are varying from the student inside the campus to an employee in a corporate office exposed to the threat. This field of research must be addressed in all part of information technology areas in terms of the type of backdoors such as Crypto, Systems and Application backdoors. This paper discusses the backdoors and its types also this study attempts to investigate the threat of backdoors using open source software. It illustrates the various countries including Oman that originate backdoors which census overall 2% of backdoors.