Sei sulla pagina 1di 3

Running head: ENGINEERING DESIGN TO: TA FROM: [Student Name] DATE: February 12, 2014 SUBJECT: Introduction to Engineering

Design 1. Introduction The aim of this memo is to provide information of the findings following successive attendance of the Engineering Connect session. In as much as there are 14 NAE Grand Challenges, this session focused on a certain area of engineering. 2. The Grand Challenge In the Engineering Connect session I participated, there was an inclination towards securing the cyberspace. It has become apparent that the cyberspace is increasingly becoming insecure as malicious tactics are developed for advanced criminal activities. Hence, cyberspace security is a serious concern especially given the current overreliance on computer networks to control

virtually all aspects of daily lives including but not limited to cellphones, traffic lights, air traffic commands, military, finance, radio, TV and emergency services (National Academy of Engineering, 2012). An intrusion of subversion of critical network poses a danger, especially with identity theft (National Academy of Engineering, 2012). Item Learnt at Engineering Connect From the session, I learnt that, in current hardware and software system design, there are holes exploited by malicious individuals creating masquerading software that install rootkit into the

ENGINEERING DESIGN systems only to open the systems backdoor. I learnt that, despite novel antivirus systems in place that scan user-environment, it is imperative to note that rootkits are being developed for kernel and below OS kernel in addition to below hypervisor region. 3. Research Topic Covered at Engineering Connect In particular, the session I attended focused on rootkit evolution in mobile platform. The session covered evolution of mobile rootkits like in 2009 the emergence of iKee.A and iKee.B specifically targeting iPhone to exploit jailbroken iPhone through SSH or GingerMaster, Droid KungFu and Droid Deluxe in 2011 targeting Android phones. The session exemplified on what such mobile rootkits do where they snoop on private conversations, use GPS to track user location, and stealthily enable microphone and camera. 4. Engineering Connect Session and Personal Career Choice This session has had a significant impact with new inclinations towards cyberspace security

related field quest (National Academy of Engineering, 2012). I am rethinking future endeavors to be in this line, and join the team of experts in designing novel platforms that are proactive in detecting malicious codes prior to installation in any system. 5. Conclusion In conclusion, the knowledge about Grand Challenges is exhilarating especially on the level of threat that this threats pose on daily lives. The enormity of cyberspace security threat is provocative to take an active step in proactively curbing the vice.

ENGINEERING DESIGN

Reference National Academy of Engineering. (2012). Secure cyberspace. NAE Grand Challenges for Engineering. Retrieved from http://www.engineeringchallenges.org/cms/8996/9042.aspx

Potrebbero piacerti anche