Technology Exploitation: Today's Hidden Challenge
This paper addresses a serious hidden threat that poses a fundamental risk to all users of IT and telecommunications systems, and proffers solutions for dealing with such threats. Heretofore, IT and telecommunications professionals have been concerned with threats from viruses, worms, Trojans, password hacking, rootkit, EMI/RFI attacks, etc. However, today it is becoming likely that a much more pernicious threat exists in the form of “technology exploitations” against which most are ill prepared to defend themselves. These technology exploits are examined and process and economic solutions are proffered to help in mitigating such challenges.
Keywords: IT, Information technology, Telecommunications, Exploits, Technology, Technology Exploits, Risks, Threats, vulnerabilities, CyberTrust, SysTrust, SAS 70, AICPA, Common Criteria, Evaluated Systems, Trusted Systems, viruses, worms, Trojans, rootkits, EMI RFI, password hacking, warranties, audits, wizards, Langley, Amdocs, firewall, patches, trust, borders, CIA model, confidentiality, integrity, availability, compromised, conceal, Steganography, escalation, assets, virtual, physical, target rich environment, intellectual property, Trade secrets, military, China, Sun Tzu, Outsourcing
Dr. John H. Nugent
Associate Professor & Director of the Center of Information Assurance, Graduate School of Management, University of Dallas
Previously, Nugent served as a managing director of a venture capital firm focused in the telecommunications and IT sectors, as well as CEO and Board of Director Member of several AT&T subsidiaries with responsibility for operations in some 90+ countries. In this latter position, Nugent oversaw the design, development, and installation of over 100 state of the art secure communications products and systems ranging from chips, to products, to switches, to secure satellite networks. Here, Nugent worked closely with Foreign Ministries, Ministers of Defense and Interior, and many Intelligence agencies in securing their state assets and communications systems.
Nugent additionally serves on several American Bar Association sub committees that research and publish on Information Security matters. Nugent additionally represents the University’s Center of Information Assurance on the U.S. Secret Service’s North Texas Electronic Crimes Task Force.
Nugent is widely published and serves as a national speaker for many regulatory and commercial enterprises on matters dealing with telecommunications policy and information security. Previously, Nugent drafted the national telecommunications infrastructure plan for a leading Asian nation.
Nugent has been recognized for his work by universities, governments and major publications including Defense Electronics “10 Rising Stars,” and by the Republic of France with the award of the “Diplome de Citoyen D’Honneur.”
Dr. David Gordon
Professor, Graduate School of Management, University of Dallas
Dr. Fernando Arellano
Assistant Professor, Graduate School of Management, University of Dallas