語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Electronic product protection and an...
~
Utica College.
Electronic product protection and anti-tamper techniques.
紀錄類型:
書目-語言資料,手稿 : Monograph/item
正題名/作者:
Electronic product protection and anti-tamper techniques./
作者:
Woodruff, Senica M., Sr.
面頁冊數:
1 online resource (76 pages)
附註:
Source: Masters Abstracts International, Volume: 56-02.
標題:
Computer science. -
電子資源:
click for full text (PQDT)
ISBN:
9781369436853
Electronic product protection and anti-tamper techniques.
Woodruff, Senica M., Sr.
Electronic product protection and anti-tamper techniques.
- 1 online resource (76 pages)
Source: Masters Abstracts International, Volume: 56-02.
Thesis (M.S.)--Utica College, 2016.
Includes bibliographical references
Counterfeit products are a worldwide problem for every U.S. Company and the government who is in charge of deterring, mitigating, and preventing it. Since each product produced in the United States has the potential to be exported to other countries, protecting the company's product from reverse engineering, counterfeiting, and preserving the companies brand is important. The purpose of this research is to highlight the challenges protecting electronic products, which countries is responsible for counterfeiting these products, why these products are counterfeited, how these products effect commercial and military products, and what the United States government is doing to protect the global supply chain. This is important since government contractors use commercial off the shelf (COTS) products to develop combat systems. Once development of the combat system is complete, imbedded COTS are deployed throughout the world within military systems. Due to the product embedment, it is imperative to protect company proprietary data and military critical program information (CPI). The importance of this research paper will discuss the benefits and impacts of reverse engineering, reverse engineering countermeasures for protecting the product, and measures, hardware and software, for protecting commercial products and combat systems. The research has determined, despite laws, various physical and electronic countermeasures, and cyber security policies, an electronic product has a 5-year life span before the product is reverse engineered and sold on the black market by China or other counterfeiters and as a result, the company's competitive advantage is lost.
Electronic reproduction.
Ann Arbor, Mich. :
ProQuest,
2018
Mode of access: World Wide Web
ISBN: 9781369436853Subjects--Topical Terms:
573171
Computer science.
Index Terms--Genre/Form:
554714
Electronic books.
Electronic product protection and anti-tamper techniques.
LDR
:02785ntm a2200325K 4500
001
915274
005
20180727125212.5
006
m o u
007
cr mn||||a|a||
008
190606s2016 xx obm 000 0 eng d
020
$a
9781369436853
035
$a
(MiAaPQ)AAI10251023
035
$a
(MiAaPQ)utica:10860
035
$a
AAI10251023
040
$a
MiAaPQ
$b
eng
$c
MiAaPQ
100
1
$a
Woodruff, Senica M., Sr.
$3
1188583
245
1 0
$a
Electronic product protection and anti-tamper techniques.
264
0
$c
2016
300
$a
1 online resource (76 pages)
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
500
$a
Source: Masters Abstracts International, Volume: 56-02.
500
$a
Adviser: Cynthia Gonnella.
502
$a
Thesis (M.S.)--Utica College, 2016.
504
$a
Includes bibliographical references
520
$a
Counterfeit products are a worldwide problem for every U.S. Company and the government who is in charge of deterring, mitigating, and preventing it. Since each product produced in the United States has the potential to be exported to other countries, protecting the company's product from reverse engineering, counterfeiting, and preserving the companies brand is important. The purpose of this research is to highlight the challenges protecting electronic products, which countries is responsible for counterfeiting these products, why these products are counterfeited, how these products effect commercial and military products, and what the United States government is doing to protect the global supply chain. This is important since government contractors use commercial off the shelf (COTS) products to develop combat systems. Once development of the combat system is complete, imbedded COTS are deployed throughout the world within military systems. Due to the product embedment, it is imperative to protect company proprietary data and military critical program information (CPI). The importance of this research paper will discuss the benefits and impacts of reverse engineering, reverse engineering countermeasures for protecting the product, and measures, hardware and software, for protecting commercial products and combat systems. The research has determined, despite laws, various physical and electronic countermeasures, and cyber security policies, an electronic product has a 5-year life span before the product is reverse engineered and sold on the black market by China or other counterfeiters and as a result, the company's competitive advantage is lost.
533
$a
Electronic reproduction.
$b
Ann Arbor, Mich. :
$c
ProQuest,
$d
2018
538
$a
Mode of access: World Wide Web
650
4
$a
Computer science.
$3
573171
650
4
$a
Computer engineering.
$3
569006
655
7
$a
Electronic books.
$2
local
$3
554714
690
$a
0984
690
$a
0464
710
2
$a
ProQuest Information and Learning Co.
$3
1178819
710
2
$a
Utica College.
$b
Cybersecurity.
$3
1148527
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10251023
$z
click for full text (PQDT)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入