메뉴 건너뛰기




Volumn , Issue , 2007, Pages 155-159

Endpoint security: Managing USB-based removable devices with the advent of portable applications

Author keywords

Endpoint security; iPod; Network security; PDA; Removable media; USB devices; Virus

Indexed keywords

ENDPOINT SECURITY; IPOD; PDA; REMOVABLE MEDIA; USB DEVICES;

EID: 62949173483     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1409908.1409935     Document Type: Conference Paper
Times cited : (14)

References (48)
  • 1
    • 62949148566 scopus 로고    scopus 로고
    • Gozor Finished payload. (2007, May 30). [MsgID 70406] Message posted to http://forums.hak5.org/index.php/topic.6608.msg70406.html#msg70406
    • Gozor Finished payload. (2007, May 30). [MsgID 70406] Message posted to http://forums.hak5.org/index.php/topic.6608.msg70406.html#msg70406
  • 2
    • 62949109145 scopus 로고    scopus 로고
    • Best practices for managing and enforcing USB security. (2006, June 22). Altiris, Inc. Retrieved June 27, 2007 from http://www.altiris.com/upload/wp- bestpracticesformanagingusbsecurity.pdf
    • Best practices for managing and enforcing USB security. (2006, June 22). Altiris, Inc. Retrieved June 27, 2007 from http://www.altiris.com/upload/wp- bestpracticesformanagingusbsecurity.pdf
  • 3
    • 62949191669 scopus 로고    scopus 로고
    • Beware of strangers bearing iPods. (2005, June 25). New Scientist. Retrieved July 1, 2007 from http://www.newscientisttech.com/article/mg18625055. 500.html
    • Beware of strangers bearing iPods. (2005, June 25). New Scientist. Retrieved July 1, 2007 from http://www.newscientisttech.com/article/mg18625055. 500.html
  • 4
    • 62949235751 scopus 로고    scopus 로고
    • Effective IT policies: Acceptable use policy and the threat of lifestyle devices, (n.d.) Centennial Software, Inc. Retrieved June 27, 2007 from http://www.devicewall.com/downloads/Effective-IT-Policies-A UP-threat-of- lifestyle-devices.pdf
    • Effective IT policies: Acceptable use policy and the threat of lifestyle devices, (n.d.) Centennial Software, Inc. Retrieved June 27, 2007 from http://www.devicewall.com/downloads/Effective-IT-Policies-A UP-threat-of- lifestyle-devices.pdf
  • 5
    • 62949159221 scopus 로고    scopus 로고
    • Data breaches: Is anyone safe?. (2005, July). Information Management Journal. 10. Retrieved June 30, 2007, from MasterFJLE Premier database.
    • Data breaches: Is anyone safe?. (2005, July). Information Management Journal. 10. Retrieved June 30, 2007, from MasterFJLE Premier database.
  • 6
    • 62949235749 scopus 로고    scopus 로고
    • Five ways to prevent data theft by iPod
    • April 16, Retrieved June 30, 2007, from MasterFILE Premier database
    • Garretson, C. (2007, April 16). Five ways to prevent data theft by iPod. Network World, 24(15), 16. Retrieved June 30, 2007, from MasterFILE Premier database.
    • (2007) Network World , vol.24 , Issue.15 , pp. 16
    • Garretson, C.1
  • 7
    • 84869261913 scopus 로고    scopus 로고
    • Review: Latest Devicewall geared to SMBs
    • March 3, Retrieved July 1, 2007 from
    • Giannacopoulos, P. (2006, March 3). Review: Latest Devicewall geared to SMBs. SearchSecurity.com. Retrieved July 1, 2007 from http://searchsecurity.techtarget.com/originalContent/0,289142,sid14-gci1170609. 00.html
    • (2006) SearchSecurity.com , pp. 289142
    • Giannacopoulos, P.1
  • 9
    • 84869245777 scopus 로고    scopus 로고
    • USBs' giant sucking sound
    • April 20, Retrieved July 1, 2007 from
    • Higgins, K, (2007, April 20). USBs' giant sucking sound. Dark Reading. Retrieved July 1, 2007 from http://www.darkreading.com/document. asp?doc-id=122252
    • (2007) Dark Reading
    • Higgins, K.1
  • 10
    • 62949110970 scopus 로고    scopus 로고
    • Jabra (n.d.). Installing Backtrack to a USB stick or hard drive. Retrieved July 1, 2007 from http://www.offensive-security.com/documentation/ backtrack-hd-install.,pdf
    • Jabra (n.d.). Installing Backtrack to a USB stick or hard drive. Retrieved July 1, 2007 from http://www.offensive-security.com/documentation/ backtrack-hd-install.,pdf
  • 11
    • 62949194898 scopus 로고    scopus 로고
    • eWeek, 23
    • 11, 10. Retrieved June 30, from Computer Source database
    • Lundquist, E. (2006, April 24). USB security: A sticky situation. eWeek, 23(11), 10. Retrieved June 30, 2007, from Computer Source database.
    • (2006)
    • Lundquist, E.1
  • 12
    • 84869245512 scopus 로고    scopus 로고
    • Los Alamos data leaks due to 'gross mis-management'
    • March 21, Retrieved July 1, 2007 from
    • Mellor, C. (2007, March 21). Los Alamos data leaks due to 'gross mis-management'. Techworld. Retrieved July 1, 2007 from http://www.techworld.com/storage/features/index.cfm?featureID=3247&pagtvpe= all
    • (2007) Techworld
    • Mellor, C.1
  • 13
    • 84869260937 scopus 로고    scopus 로고
    • La sécurité des clés USB mise à mal par USBDUMPER
    • July 6, Retrieved July 1, 2007 from
    • Poli, X. (2006, July 6) La sécurité des clés USB mise à mal par USBDUMPER, SecuObs.com, Retrieved July 1, 2007 from http://www.secuobs.com/news/07062006-sstic-usbdumper.shtml
    • (2006) SecuObs.com
    • Poli, X.1
  • 14
    • 62949232904 scopus 로고    scopus 로고
    • Reardon, M (2005). Securing data from the threat within. CNetNews.com, Retrieved July 1, 2007 from http://news.com.com/ Securing+data+f'rom+the+threat+within/2100-7347-3-5520016.html
    • Reardon, M (2005). Securing data from the threat within. CNetNews.com, Retrieved July 1, 2007 from http://news.com.com/ Securing+data+f'rom+the+threat+within/2100-7347-3-5520016.html
  • 15
    • 84869260068 scopus 로고    scopus 로고
    • Keeping pace with emerging endpoint security technologies
    • July 17, Retrieved July 1, 2006 from
    • Rothke, B. (2006, July 17). Keeping pace with emerging endpoint security technologies. Searchsecurity.com. Retrieved July 1, 2006 from http://searchsecurity.techtarget.eom/tip/0,289483.sid14-gci1193887.00.html
    • (2006) Searchsecurity.com , pp. 289483
    • Rothke, B.1
  • 16
    • 62949218212 scopus 로고    scopus 로고
    • Endpoint security without the pain
    • January 23, Retrieved June 30, 2007, from Computer Source database
    • Scheier, R. (2006, January 23). Endpoint security without the pain. Computerworld, 40(4), 21-22. Retrieved June 30, 2007, from Computer Source database.
    • (2006) Computerworld , vol.40 , Issue.4 , pp. 21-22
    • Scheier, R.1
  • 17
    • 62949135555 scopus 로고    scopus 로고
    • Don't spring a data leak
    • December, Retrieved June 30, 2007, from Computer Source database
    • Spangler, T. (2006, December). Don't spring a data leak. Baseline, 7-9. Retrieved June 30, 2007, from Computer Source database.
    • (2006) Baseline , pp. 7-9
    • Spangler, T.1
  • 18
    • 84869244819 scopus 로고    scopus 로고
    • June 7, Retrieved June 27, 2007 from
    • Stasiukonis, S. (2006, June 7). Dark Reading. Retrieved June 27, 2007 from http://www.darkreading.com/document.asp?doc-id=95556&WT.svl= column1-1
    • (2006) Dark Reading
    • Stasiukonis, S.1
  • 19
    • 62949121198 scopus 로고    scopus 로고
    • eWeek, 23(29)
    • 20. Retrieved June 30, from Computer Source database
    • Strom, D. (2006, July 24). Getting a lock on endpoints. eWeek, 23(29), 20. Retrieved June 30, 2007, from Computer Source database.
    • (2006)
    • Strom, D.1
  • 20
    • 28244472718 scopus 로고    scopus 로고
    • The great wall syndrome
    • September/October, Retrieved June 30, 2007 from ProQuest ABI Inform Complete database
    • Thelander, M. (2005, September/October). The great wall syndrome, IT Professional, 7(5)25-30. Retrieved June 30, 2007 from ProQuest ABI Inform Complete database.
    • (2005) IT Professional , vol.7 , Issue.5 , pp. 25-30
    • Thelander, M.1
  • 21
    • 62949105131 scopus 로고    scopus 로고
    • Toto, G. (2007). Seven signs that it's time to automate and consolidate IT policy enforcement. BigFix, Inc. Retrieved July 1, 2007 from http://www.bigfix.com/resourcecenter/seven-signs.pdf
    • Toto, G. (2007). Seven signs that it's time to automate and consolidate IT policy enforcement. BigFix, Inc. Retrieved July 1, 2007 from http://www.bigfix.com/resourcecenter/seven-signs.pdf
  • 22
    • 62949196783 scopus 로고    scopus 로고
    • Usher, Abe (2005), Sharp ideas: podslurping. Sharp Ideas, Inc. Retrieved June 27, 2007 from http://www.sharp-ideas.net/pod-slurping.php
    • Usher, Abe (2005), Sharp ideas: podslurping. Sharp Ideas, Inc. Retrieved June 27, 2007 from http://www.sharp-ideas.net/pod-slurping.php
  • 23
    • 84869249379 scopus 로고    scopus 로고
    • USB memory sticks pose new dangers
    • September 25, Retrieved July 1, 2007 from
    • Vijayan, J. (2006, September 25), USB memory sticks pose new dangers. Computerworld. Retrieved July 1, 2007 from http://www.computerworld.com/ action/article.do?com.mand=view ArticleBasic&articleId=9003592
    • (2006) Computerworld
    • Vijayan, J.1
  • 24
    • 84869260527 scopus 로고    scopus 로고
    • October 6, Retrieved June 27, 2007 from
    • Westin, K. (2006a, October 6). USB hacks: USB dumper. Retrieved June 27, 2007 from http://www.usbhacks.com/2006/10/06/usb-dumper/
    • (2006) USB hacks: USB dumper
    • Westin, K.1
  • 25
    • 84869260527 scopus 로고    scopus 로고
    • October 7, Retrieved June 27, 2007 from
    • Westin, K. (2006b, October 7). USB hacks: USB switchblade. Retrieved June 27, 2007 from http://www.usbhacks.com/2006/10/07/usb-switchblade/
    • (2006) USB hacks: USB switchblade
    • Westin, K.1
  • 26
    • 84869260527 scopus 로고    scopus 로고
    • October 7, Retrieved June 27, 2007 from
    • Westin, K. (2006c, October 7). USB hacks: USB hacksaw. Retrieved June 27, 2007 from http://www.usbhacks.com/2006/10/07/usb-hacksaw/
    • (2006) USB hacks: USB hacksaw
    • Westin, K.1
  • 27
    • 84869252703 scopus 로고    scopus 로고
    • October 5, Retrieved June 27, 2007 from
    • Westin, K. (2006d, October 5). USB hacks: Mitigation. Retrieved June 27, 2007 from http://www.usbhacks.com/2006/10/05/how-to-disable-usb-and-cd-rom-on-a- windows-network-using-use-group-policy
    • (2006) USB hacks: Mitigation
    • Westin, K.1
  • 28
    • 62949166887 scopus 로고    scopus 로고
    • Workplace data theft common in U.K. (2007, January). Information Management Journal. 18, Retrieved June 30, 2007, from MasterFILE Premier database.
    • Workplace data theft common in U.K. (2007, January). Information Management Journal. 18, Retrieved June 30, 2007, from MasterFILE Premier database.
  • 29
    • 84869241623 scopus 로고    scopus 로고
    • http://www.python.org
  • 30
    • 84869241726 scopus 로고    scopus 로고
    • http://www.senfocre.com
  • 31
    • 84869260733 scopus 로고    scopus 로고
    • http://www.hak5.org
  • 32
    • 84869241722 scopus 로고    scopus 로고
    • http://www.u3.com
  • 33
    • 84869260734 scopus 로고    scopus 로고
    • http://wiki.hak5.org/wiki/USB-Switchblade
  • 34
    • 84869241724 scopus 로고    scopus 로고
    • http://wiki.hak5.org/wiki/USB-Hacksaw
  • 35
    • 84869241620 scopus 로고    scopus 로고
    • http://insecure.org/nm.ap
  • 36
    • 84869251761 scopus 로고    scopus 로고
    • http://www.wireshark.org
  • 37
    • 84869241720 scopus 로고    scopus 로고
    • httos://foundstore.com/index.htm?subnav=resources/navigation. htm&subcontent=/resources/proddesc/superscan.htm
  • 38
    • 84869241721 scopus 로고    scopus 로고
    • http://www.portableapps.com
  • 39
    • 84869260732 scopus 로고    scopus 로고
    • http://www.pegtop.net/start
  • 40
    • 84869260731 scopus 로고    scopus 로고
    • available at
    • Episode 2×10, available at http://www.hak5.org/episodes/
    • Episode 2×10
  • 41
    • 84869241611 scopus 로고    scopus 로고
    • http://www.truecrypt.org/
  • 42
    • 84869251759 scopus 로고    scopus 로고
    • http://www.gtopala.com/
  • 43
    • 84869260727 scopus 로고    scopus 로고
    • http://www.baremetalsoft.com/baregrep
  • 44
    • 84869241612 scopus 로고    scopus 로고
    • www.knoppix.org
  • 45
    • 84869241613 scopus 로고    scopus 로고
    • http://www.remote-exploit.org/backtrack.html
  • 46
    • 84869241614 scopus 로고    scopus 로고
    • http://www.metasploit.com
  • 47
    • 84869241715 scopus 로고    scopus 로고
    • http://www.e-fense.com/helix
  • 48
    • 84869241718 scopus 로고    scopus 로고
    • http://www.devicewall.com.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.