Manage Clipboard to Prevent Copying Important Files

NATAASHA, RAUL and NEHA, LOKHANDE and PRIYANK, CHHEDA and SIDDHESH, KARODE (2014) Manage Clipboard to Prevent Copying Important Files. In: International Conference on Advances In Engineering And Technology - ICAET 2014, 24 - 25 May, 2014, RIT, Roorkee, India.

[img]
Preview
Text
20140721_103513.pdf - Published Version

Download (843kB) | Preview
Official URL: https://www.seekdl.org/conferences/paper/details/3...

Abstract

Traditional security measures have been developed to protect computer system and data within mainly against outside attackers. However, in modern world, new types of threat arise due to bribable employee. Insider threats have potential to inflict severe damage to organization’s resources, financial assets and reputation. There are many types of insider threats which can break confidentiality, integrity, or availability. This paper focuses on the violations of confidentiality and integrity by privilege misuse or escalation in sensitive applications. First, we analyze and identify insider-threat scenarios that compromise confidentiality and integrity. We then discuss how to detect each threat scenario by analyzing the primitive user activities. We have implemented a threat detection mechanism by extending the capabilities of existing software packages. Since our approach can proactively detect the insider’s malicious behaviors before the malicious insider’s goal is achieved, we can prevent the possible damage proactively. In this paper we apply our ideas to the Windows environment as well as Linux environment.

Item Type: Conference or Workshop Item (Paper)
Uncontrolled Keywords: Active Detection, Monitoring, Insider Threat
Depositing User: Mr. John Steve
Date Deposited: 21 May 2019 10:54
Last Modified: 21 May 2019 10:54
URI: http://publications.theired.org/id/eprint/2600

Actions (login required)

View Item View Item