National Conference on Communication Technologies & its impact on Next Generation Computing 2012 |
Foundation of Computer Science USA |
CTNGC - Number 1 |
November 2012 |
Authors: Saurabh Verma, Rahul Lamba, Abhishek Singh, Amitesh Verma |
b2a253f2-a076-4759-a9a4-69ccfcfa90a8 |
Saurabh Verma, Rahul Lamba, Abhishek Singh, Amitesh Verma . Data Theft Prevention and Endpoint Protection from PnP Devices. National Conference on Communication Technologies & its impact on Next Generation Computing 2012. CTNGC, 1 (November 2012), 15-27.
Podslurping is the intentional or unintentional use of a portable USB mass storage device, such as a USB flash drive (or "thumb drive"), to illicitly download and store confidential and proprietary data from network endpoint. [1] Many organizations are unaware of, or choosing to ignore, the threat presented by portable devices in their network environment until some event, ranging from unfortunate to catastrophic, happens. In hard economic times, cybercrime and data leakage increase, finding an easy target in endpoints. The key to managing portable devices in business environment is to give administrator direct control over what devices are in use on your network. In this paper we present the need and implementation of access and identity management for endpoint protection and data security from PnP USB devices to maintain information security in a corporate network.