Computer Security from External Devices

Abstract

the portable storage market environment is rapidly changing due to the emergence of USB memory. USB memory is used as a portable storage device by many users. However, due to the high portability of USB memory, there are many problems where personal identifiable information data and corporate confidential affairs are leaked to the public in case of loss, theft, or capture of the portable device. Therefore it is very important to develop various kinds of authentication solutions to protect the confidential information against unauthorized access. In this paper we present the implementation of system that limit access and manage identity for endpoint protection and data theft prevention from USB and external devices to maintain information security in a corporate environment.

Authors and Affiliations

Pushkar Shetye, Chandrashekhar Khot, Abhishek Karande

Keywords

Related Articles

Culture-Free Detection of Enterotoxigenic Escherichia Coli in Food by Polymerase Chain Reaction

Microbial quality of food has immense importance for protection of human health in rural and urban settings. Rapid and specific detection of enterotoxigenic Escherichia coli (ETEC) is critical for the management of the...

Gaurav Kumar, Prof. Durgesh Wadbude

We propose a novel compression scheme for digital images using chrominance channels with feature descriptor and Discrete Cosine Transform (DCT). The feature descriptor of chrominance channel is based on their error metr...

Congestion Control Inventive Approach for Active Queue Management System in Wireless Network

The extensively studied literature in the context of wired networks is the Active Queue Management (AQM) algorithms. In this paper, we have used kalman filter in a inventive way. This paper presents recommendations to t...

Laser Atmospheric Transmission Limitations in Optical Wireless Communication Systems Based on Different Transmission Levels for Short and Local areas Network Applications

This paper has presented optical wireless communication systems performance prediction based on different visibility levels for indoor, local, and wide area network applications s over wide range of the affecting parame...

Biometric Recognition System Based On Mergence of Three Human Traits

This paper designs a Hybrid Biometric System which integrates together three human modalities: fingerprint, iris and face to outperform single modality based system. Light is thrown on all the algorithms used for pre-pr...

Download PDF file
  • EP ID EP21844
  • DOI -
  • Views 245
  • Downloads 4

How To Cite

Pushkar Shetye, Chandrashekhar Khot, Abhishek Karande (2016). Computer Security from External Devices. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 4(3), -. https://europub.co.uk/articles/-A-21844