dc.description.abstract |
Increasing growth in Information Technology Infrastructure all over the world has opened new avenues for privacy breaches, data stealth attacks whereby threatening large scale businesses and technology giants. Besides invasion of land, seas, air and space boundaries, cyber has become the fifth dimension of the warfare. Global information security environment necessitates placing adequate protection and security apparatus and carry out continuous vulnerability assessment. Thereafter, concrete remedial measures are required to be taken to fix the bugs and harden the equipment security. Recent revelations by Edward Snowden have opened another dimension toward Hardware Embedded Vulnerabilities and malwares which not only require vulnerability assessment of devices but also software/ hardware forensics and network analysis. Therefore, there is a dire need that recent security leaks and vulnerabilities be analyzed and security assessment of government/ military organizations be carried out to verify installation of patches. Furthermore, a safer cyber environment demands establishing a policy framework to thwart and counter attempts of cyber espionage. |
en_US |