BLOCKBACKDOOR
Abstract
A backdoor is an undocumented method of gaining access to a program or a 
computer by using another installed program that bypasses normal 
authentication. This paper deals specifically with hardware backdoors. These 
backdoors reside in the hardware components of a computer device and they 
are often very hard to detect using normal intrusion detection methods. Our 
research on the topic revealed that most hardware computer devices are 
either manufactured with backdoors within their circuits intentionally by the 
manufacturer or some vulnerability exists without the knowledge of the 
manufacturer. As hardware backdoors remain the most dangerous and 
undetected method used by information system intruders, it is as good as 
nothing if remote connections cannot be established to them. This paper will 
showcase how these backdoors work together on different devices in a 
4 
network system and the various methods that can be employment to curb the 
problem. This will ensure that whatever the number of backdoors residing in 
a device, they will be inaccessible to the intruder and remain harmless to the 
computer system or device. As Kenya anticipates digitalizing most of its 
systems for the realization of the Vision 2030, digital gadgets will be the 
order of the day and suppose they pose the risk of information security 
breach then a big problem lies ahead. The rapid embracement of digital 
devices, example vehicle speed governors, will most likely create an 
information security breach in communication systems since these devices 
could be potential targets.

