Presentation Title

Government Contract Procurement API Coupled with CRM Technology will Open the Door for Hackers to Control the United States’ Government by November 2020

Speaker Credentials

MS

College

Dr. Kiran C. Patel College of Osteopathic Medicine, Disaster and Emergency Management

Location

Nova Southeastern University, Davie, Florida, USA

Format

Poster

Start Date

21-2-2020 8:30 AM

End Date

21-2-2020 4:00 PM

Abstract

Objective: The impact of Agroterror on United States’ government infrastructure and the ease of an attack. Background: Recognizing the government’s use of Application Programming Interface (API) technology and Customer Relationship Management (CRM) system to streamline the movement of imports, exports, and networking government contractors, led to the realization of the United States’ government’s potential susceptibility to hacking. Similar to internet surfing, currently, API allows one to communicate directly without having to log on to multiple areas. This leaves room for hackers to use backdoor channels of less protected areas to sneak in. The macro-connectivity of government contracting allows Agroterrorists endless portals that could lead to government take over less than 12 months. Methods: Coupling (API) technology with a (CRM) system that’s designed by the government, research showed the average CRM system is cloud-based to allow direct access from commonly used devices via app. Consequently, the government could be hacked by password breach, leaving officials vulnerable to attack. Results:Using a compare and contrast approach, several areas of opportunity were most concerning. Examples are contracting with agricultural countries without proper technological protections, and communications between allied nations who benefit from the acquisition of military protection. Conclusion: Agroterrorist are not the commonly known terrorist, but pragmatically use non-aggressive approaches to weaken regions to further their agenda. One must educate themself on the underlying problem of Agroterrorism and what government protections are in place. The United States’ government can avoid an attack from Agroterrorists hackers by revamping API and CRM systems and limiting international working relationships.

This document is currently not available here.

Share

COinS
 
Feb 21st, 8:30 AM Feb 21st, 4:00 PM

Government Contract Procurement API Coupled with CRM Technology will Open the Door for Hackers to Control the United States’ Government by November 2020

Nova Southeastern University, Davie, Florida, USA

Objective: The impact of Agroterror on United States’ government infrastructure and the ease of an attack. Background: Recognizing the government’s use of Application Programming Interface (API) technology and Customer Relationship Management (CRM) system to streamline the movement of imports, exports, and networking government contractors, led to the realization of the United States’ government’s potential susceptibility to hacking. Similar to internet surfing, currently, API allows one to communicate directly without having to log on to multiple areas. This leaves room for hackers to use backdoor channels of less protected areas to sneak in. The macro-connectivity of government contracting allows Agroterrorists endless portals that could lead to government take over less than 12 months. Methods: Coupling (API) technology with a (CRM) system that’s designed by the government, research showed the average CRM system is cloud-based to allow direct access from commonly used devices via app. Consequently, the government could be hacked by password breach, leaving officials vulnerable to attack. Results:Using a compare and contrast approach, several areas of opportunity were most concerning. Examples are contracting with agricultural countries without proper technological protections, and communications between allied nations who benefit from the acquisition of military protection. Conclusion: Agroterrorist are not the commonly known terrorist, but pragmatically use non-aggressive approaches to weaken regions to further their agenda. One must educate themself on the underlying problem of Agroterrorism and what government protections are in place. The United States’ government can avoid an attack from Agroterrorists hackers by revamping API and CRM systems and limiting international working relationships.