Computer Security from External Devices
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2016, Vol 4, Issue 3
Abstract
the portable storage market environment is rapidly changing due to the emergence of USB memory. USB memory is used as a portable storage device by many users. However, due to the high portability of USB memory, there are many problems where personal identifiable information data and corporate confidential affairs are leaked to the public in case of loss, theft, or capture of the portable device. Therefore it is very important to develop various kinds of authentication solutions to protect the confidential information against unauthorized access. In this paper we present the implementation of system that limit access and manage identity for endpoint protection and data theft prevention from USB and external devices to maintain information security in a corporate environment.
Authors and Affiliations
Pushkar Shetye, Chandrashekhar Khot, Abhishek Karande
Culture-Free Detection of Enterotoxigenic Escherichia Coli in Food by Polymerase Chain Reaction
Microbial quality of food has immense importance for protection of human health in rural and urban settings. Rapid and specific detection of enterotoxigenic Escherichia coli (ETEC) is critical for the management of the...
Gaurav Kumar, Prof. Durgesh Wadbude
We propose a novel compression scheme for digital images using chrominance channels with feature descriptor and Discrete Cosine Transform (DCT). The feature descriptor of chrominance channel is based on their error metr...
Congestion Control Inventive Approach for Active Queue Management System in Wireless Network
The extensively studied literature in the context of wired networks is the Active Queue Management (AQM) algorithms. In this paper, we have used kalman filter in a inventive way. This paper presents recommendations to t...
Laser Atmospheric Transmission Limitations in Optical Wireless Communication Systems Based on Different Transmission Levels for Short and Local areas Network Applications
This paper has presented optical wireless communication systems performance prediction based on different visibility levels for indoor, local, and wide area network applications s over wide range of the affecting parame...
Biometric Recognition System Based On Mergence of Three Human Traits
This paper designs a Hybrid Biometric System which integrates together three human modalities: fingerprint, iris and face to outperform single modality based system. Light is thrown on all the algorithms used for pre-pr...