AI-powered
podcast player
Listen to all your favourite podcasts with AI-powered features
Exploration of the term 'backdoor' in cybersecurity and computing history
This chapter delves into the concept of 'backdoors' in computing and cybersecurity, exploring their origins, historical instances, and modern-day implications in cybersecurity breaches and supply chain attacks. Examples from World War I and II to current government and corporate incidents are discussed, including references to 'War Games' and high-profile attacks like NotPetya and SolarWinds.