CFP last date
22 April 2024
Reseach Article

Data Theft Prevention and Endpoint Protection from PnP Devices

Published on November 2012 by Saurabh Verma, Rahul Lamba, Abhishek Singh, Amitesh Verma
National Conference on Communication Technologies & its impact on Next Generation Computing 2012
Foundation of Computer Science USA
CTNGC - Number 1
November 2012
Authors: Saurabh Verma, Rahul Lamba, Abhishek Singh, Amitesh Verma
b2a253f2-a076-4759-a9a4-69ccfcfa90a8

Saurabh Verma, Rahul Lamba, Abhishek Singh, Amitesh Verma . Data Theft Prevention and Endpoint Protection from PnP Devices. National Conference on Communication Technologies & its impact on Next Generation Computing 2012. CTNGC, 1 (November 2012), 15-27.

@article{
author = { Saurabh Verma, Rahul Lamba, Abhishek Singh, Amitesh Verma },
title = { Data Theft Prevention and Endpoint Protection from PnP Devices },
journal = { National Conference on Communication Technologies & its impact on Next Generation Computing 2012 },
issue_date = { November 2012 },
volume = { CTNGC },
number = { 1 },
month = { November },
year = { 2012 },
issn = 0975-8887,
pages = { 15-27 },
numpages = 13,
url = { /proceedings/ctngc/number1/9049-1005/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Communication Technologies & its impact on Next Generation Computing 2012
%A Saurabh Verma
%A Rahul Lamba
%A Abhishek Singh
%A Amitesh Verma
%T Data Theft Prevention and Endpoint Protection from PnP Devices
%J National Conference on Communication Technologies & its impact on Next Generation Computing 2012
%@ 0975-8887
%V CTNGC
%N 1
%P 15-27
%D 2012
%I International Journal of Computer Applications
Abstract

Podslurping is the intentional or unintentional use of a portable USB mass storage device, such as a USB flash drive (or "thumb drive"), to illicitly download and store confidential and proprietary data from network endpoint. [1] Many organizations are unaware of, or choosing to ignore, the threat presented by portable devices in their network environment until some event, ranging from unfortunate to catastrophic, happens. In hard economic times, cybercrime and data leakage increase, finding an easy target in endpoints. The key to managing portable devices in business environment is to give administrator direct control over what devices are in use on your network. In this paper we present the need and implementation of access and identity management for endpoint protection and data security from PnP USB devices to maintain information security in a corporate network.

References
  1. Zagorin, Adam "A breach in nuclear security. " Time, April 19, 2007. Retrieved April 21, 2007.
  2. Julius Baer CEO, Reuter US edition, August 27 2012.
  3. USB. org, vendors and products.
  4. IoanaBazavan Justus (18). "Identity Management Series – Role- and Rule-Basing Part 1: Introduction". The Security Catalyst helping people effectively communicate value. Michael Santarcangelo. Retrieved 23 May 2012.
  5. Phillip J. Windley, Digital Identity, O'Reilly Media, Inc. , 2005, p.
Index Terms

Computer Science
Information Sciences

Keywords

Data Theft Prevention From Unauthorized Usb Device End Point Security How To Control Usb Devices In Corporate Network Plug And Play (pnp) Devices