Call for Paper - January 2018 Edition
IJCA solicits original research papers for the January 2018 Edition. Last date of manuscript submission is December 20, 2017. Read More

Data Theft Prevention and Endpoint Protection from PnP Devices

Print
PDF
IJCA Proceedings on National Conference on Communication Technologies & its impact on Next Generation Computing 2012
© 2012 by IJCA Journal
CTNGC - Number 1
Year of Publication: 2012
Authors:
Saurabh Verma
Rahul Lamba
Abhishek Singh
Amitesh Verma

Saurabh Verma, Rahul Lamba, Abhishek Singh and Amitesh Verma. Article: Data Theft Prevention and Endpoint Protection from PnP Devices. IJCA Proceedings on National Conference on Communication Technologies & its impact on Next Generation Computing 2012 CTNGC(1):15-27, November 2012. Full text available. BibTeX

@article{key:article,
	author = {Saurabh Verma and Rahul Lamba and Abhishek Singh and Amitesh Verma},
	title = {Article: Data Theft Prevention and Endpoint Protection from PnP Devices},
	journal = {IJCA Proceedings on National Conference on Communication Technologies & its impact on Next Generation Computing 2012},
	year = {2012},
	volume = {CTNGC},
	number = {1},
	pages = {15-27},
	month = {November},
	note = {Full text available}
}

Abstract

Podslurping is the intentional or unintentional use of a portable USB mass storage device, such as a USB flash drive (or "thumb drive"), to illicitly download and store confidential and proprietary data from network endpoint. [1] Many organizations are unaware of, or choosing to ignore, the threat presented by portable devices in their network environment until some event, ranging from unfortunate to catastrophic, happens. In hard economic times, cybercrime and data leakage increase, finding an easy target in endpoints. The key to managing portable devices in business environment is to give administrator direct control over what devices are in use on your network. In this paper we present the need and implementation of access and identity management for endpoint protection and data security from PnP USB devices to maintain information security in a corporate network.

References

  • Zagorin, Adam "A breach in nuclear security. " Time, April 19, 2007. Retrieved April 21, 2007.
  • Julius Baer CEO, Reuter US edition, August 27 2012.
  • USB. org, vendors and products.
  • IoanaBazavan Justus (18). "Identity Management Series – Role- and Rule-Basing Part 1: Introduction". The Security Catalyst helping people effectively communicate value. Michael Santarcangelo. Retrieved 23 May 2012.
  • Phillip J. Windley, Digital Identity, O'Reilly Media, Inc. , 2005, p.