Solution should be able to detect backdoors in following components:
- Applications and OS.
- Desktop/server hardware.
- Network switch.
The solution can be a toolkit comprising of separate solutions for each component.
Notes: The participants can attempt individual parts of the problem if they are not able to address all the components.
Sample Data Required: No