Language:
English
繁體中文
Help
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Electronic product protection and an...
~
Utica College.
Electronic product protection and anti-tamper techniques.
Record Type:
Language materials, manuscript : Monograph/item
Title/Author:
Electronic product protection and anti-tamper techniques./
Author:
Woodruff, Senica M., Sr.
Description:
1 online resource (76 pages)
Notes:
Source: Masters Abstracts International, Volume: 56-02.
Subject:
Computer science. -
Online resource:
click for full text (PQDT)
ISBN:
9781369436853
Electronic product protection and anti-tamper techniques.
Woodruff, Senica M., Sr.
Electronic product protection and anti-tamper techniques.
- 1 online resource (76 pages)
Source: Masters Abstracts International, Volume: 56-02.
Thesis (M.S.)--Utica College, 2016.
Includes bibliographical references
Counterfeit products are a worldwide problem for every U.S. Company and the government who is in charge of deterring, mitigating, and preventing it. Since each product produced in the United States has the potential to be exported to other countries, protecting the company's product from reverse engineering, counterfeiting, and preserving the companies brand is important. The purpose of this research is to highlight the challenges protecting electronic products, which countries is responsible for counterfeiting these products, why these products are counterfeited, how these products effect commercial and military products, and what the United States government is doing to protect the global supply chain. This is important since government contractors use commercial off the shelf (COTS) products to develop combat systems. Once development of the combat system is complete, imbedded COTS are deployed throughout the world within military systems. Due to the product embedment, it is imperative to protect company proprietary data and military critical program information (CPI). The importance of this research paper will discuss the benefits and impacts of reverse engineering, reverse engineering countermeasures for protecting the product, and measures, hardware and software, for protecting commercial products and combat systems. The research has determined, despite laws, various physical and electronic countermeasures, and cyber security policies, an electronic product has a 5-year life span before the product is reverse engineered and sold on the black market by China or other counterfeiters and as a result, the company's competitive advantage is lost.
Electronic reproduction.
Ann Arbor, Mich. :
ProQuest,
2018
Mode of access: World Wide Web
ISBN: 9781369436853Subjects--Topical Terms:
573171
Computer science.
Index Terms--Genre/Form:
554714
Electronic books.
Electronic product protection and anti-tamper techniques.
LDR
:02785ntm a2200325K 4500
001
915274
005
20180727125212.5
006
m o u
007
cr mn||||a|a||
008
190606s2016 xx obm 000 0 eng d
020
$a
9781369436853
035
$a
(MiAaPQ)AAI10251023
035
$a
(MiAaPQ)utica:10860
035
$a
AAI10251023
040
$a
MiAaPQ
$b
eng
$c
MiAaPQ
100
1
$a
Woodruff, Senica M., Sr.
$3
1188583
245
1 0
$a
Electronic product protection and anti-tamper techniques.
264
0
$c
2016
300
$a
1 online resource (76 pages)
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
500
$a
Source: Masters Abstracts International, Volume: 56-02.
500
$a
Adviser: Cynthia Gonnella.
502
$a
Thesis (M.S.)--Utica College, 2016.
504
$a
Includes bibliographical references
520
$a
Counterfeit products are a worldwide problem for every U.S. Company and the government who is in charge of deterring, mitigating, and preventing it. Since each product produced in the United States has the potential to be exported to other countries, protecting the company's product from reverse engineering, counterfeiting, and preserving the companies brand is important. The purpose of this research is to highlight the challenges protecting electronic products, which countries is responsible for counterfeiting these products, why these products are counterfeited, how these products effect commercial and military products, and what the United States government is doing to protect the global supply chain. This is important since government contractors use commercial off the shelf (COTS) products to develop combat systems. Once development of the combat system is complete, imbedded COTS are deployed throughout the world within military systems. Due to the product embedment, it is imperative to protect company proprietary data and military critical program information (CPI). The importance of this research paper will discuss the benefits and impacts of reverse engineering, reverse engineering countermeasures for protecting the product, and measures, hardware and software, for protecting commercial products and combat systems. The research has determined, despite laws, various physical and electronic countermeasures, and cyber security policies, an electronic product has a 5-year life span before the product is reverse engineered and sold on the black market by China or other counterfeiters and as a result, the company's competitive advantage is lost.
533
$a
Electronic reproduction.
$b
Ann Arbor, Mich. :
$c
ProQuest,
$d
2018
538
$a
Mode of access: World Wide Web
650
4
$a
Computer science.
$3
573171
650
4
$a
Computer engineering.
$3
569006
655
7
$a
Electronic books.
$2
local
$3
554714
690
$a
0984
690
$a
0464
710
2
$a
ProQuest Information and Learning Co.
$3
1178819
710
2
$a
Utica College.
$b
Cybersecurity.
$3
1148527
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10251023
$z
click for full text (PQDT)
based on 0 review(s)
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login