Business and Technology
Luis Omar Rivera-Lopez, DCS @LuisRiveraLopez
Title: Doctor of Computer Science (DCS)
Research Topic: Backdoor Intrusions
Institution: Colorado Technical University
Committee Chair: Debra Burrington, Ph.D.
Abstract: The problem addressed is the strategies network security managers need to protect their networks from backdoor intrusions. Twelve participants that had experience as network managers or systems administrators were interviewed using nine open-ended questions. The research methodology chosen for this study is a qualitative exploratory approach. The findings on this research resulted in four major themes including human factor, backdoor detection techniques, defense-in-depth and network monitoring strategies. The three prominent topics found were involvement of management, effective administrative policies and ethical hacking services. The analysis based on the responses provided details related to strategies needed to protect networks from backdoor intrusions relying on the experience of twelve participants. The implications for practice in the cybersecurity and information assurance field suggests that current backdoor detection techniques are complex, and challenges are still present in order to enhance strategies to deter backdoor intrusions.
Keywords: backdoor, network defense strategies, network countermeasures
Click here to download the study
Title: Doctor of Computer Science (DCS)
Research Topic: Backdoor Intrusions
Institution: Colorado Technical University
Committee Chair: Debra Burrington, Ph.D.
Abstract: The problem addressed is the strategies network security managers need to protect their networks from backdoor intrusions. Twelve participants that had experience as network managers or systems administrators were interviewed using nine open-ended questions. The research methodology chosen for this study is a qualitative exploratory approach. The findings on this research resulted in four major themes including human factor, backdoor detection techniques, defense-in-depth and network monitoring strategies. The three prominent topics found were involvement of management, effective administrative policies and ethical hacking services. The analysis based on the responses provided details related to strategies needed to protect networks from backdoor intrusions relying on the experience of twelve participants. The implications for practice in the cybersecurity and information assurance field suggests that current backdoor detection techniques are complex, and challenges are still present in order to enhance strategies to deter backdoor intrusions.
Keywords: backdoor, network defense strategies, network countermeasures
Click here to download the study
rivera-lopez_l._o.__2018__doctoral_dissertation_colorado_technical_university_.pdf | |
File Size: | 1550 kb |
File Type: |