DocumentCode :
3021962
Title :
Data theft prevention & endpoint protection from unauthorized USB devices — Implementation
Author :
Verma, Shalini ; Singh, Ashutosh
Author_Institution :
IT Dept., Fareportal India PVT Ltd., Gurgaon, India
fYear :
2012
fDate :
13-15 Dec. 2012
Firstpage :
1
Lastpage :
4
Abstract :
Podslurping is the intentional or unintentional use of a portable USB mass storage device, such as a USB flash drive (or “thumb drive”), to illicitly download and store confidential and proprietary data from network endpoint [1]. There are many establishments and organization that are unaware of, or choose to remain ignorant about the threat that can be caused by portable devices in their network setting until some events that can be from a minor unfortunate incident to a complete catastrophe. In the information age, cybercrime and information leakage increase, because endpoints are an easy target [2]. The key to managing portable devices in business environment is to give administrator direct control over what devices are in use on your network. In this paper we present the implementation of access and identity management for endpoint protection and data security from USB devices to maintain information security and data theft prevention in a corporate environment.
Keywords :
authorisation; computer network security; organisational aspects; peripheral interfaces; access management; business environment; confidential data illicit download; confidential data illicit storage; corporate environment; cybercrime; data security; data theft prevention; identity management; information age; information leakage; information security maintenance; intentional use; network endpoint protection; podslurping; portable USB mass storage device unintentional usage; portable USB mass storage device unintentional use; portable device management; proprietary data illicit download; proprietary data illicit storage; thumb drive; unauthorized USB flash drive; Computers; IP networks; Organizations; Ports (Computers); Reactive power; Security; Universal Serial Bus; Access and identity management; Data security; Data theft prevention; Data theft prevention from unauthorized USB device; Endpoint protection; IT security;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Advanced Computing (ICoAC), 2012 Fourth International Conference on
Conference_Location :
Chennai
Print_ISBN :
978-1-4673-5583-4
Type :
conf
DOI :
10.1109/ICoAC.2012.6416856
Filename :
6416856
Link To Document :
بازگشت