Theft Prevention

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 594 Experts worldwide ranked by ideXlab platform

Abhishek Singh - One of the best experts on this subject based on the ideXlab platform.

  • data Theft Prevention endpoint protection from unauthorized usb devices implementation
    International Conference on Advanced Computing, 2012
    Co-Authors: Saurabh Verma, Abhishek Singh
    Abstract:

    Podslurping is the intentional or unintentional use of a portable USB mass storage device, such as a USB flash drive (or “thumb drive”), to illicitly download and store confidential and proprietary data from network endpoint [1]. There are many establishments and organization that are unaware of, or choose to remain ignorant about the threat that can be caused by portable devices in their network setting until some events that can be from a minor unfortunate incident to a complete catastrophe. In the information age, cybercrime and information leakage increase, because endpoints are an easy target [2]. The key to managing portable devices in business environment is to give administrator direct control over what devices are in use on your network. In this paper we present the implementation of access and identity management for endpoint protection and data security from USB devices to maintain information security and data Theft Prevention in a corporate environment.

  • Data Theft Prevention and Endpoint Protection from PnP Devices
    2012
    Co-Authors: Saurabh Verma, Rahul Lamba, Abhishek Singh, Amitesh Verma
    Abstract:

    Podslurping is the intentional or unintentional use of a portable USB mass storage device, such as a USB flash drive (or “thumb drive”), to illicitly download and store confidential and proprietary data from network endpoint.[1] Many organizations are unaware of, or choosing to ignore, the threat presented by portable devices in their network environment until some event, ranging from unfortunate to catastrophic, happens. In hard economic times, cybercrime and data leakage increase, finding an easy target in endpoints. The key to managing portable devices in business environment is to give administrator direct control over what devices are in use on your network. In this paper we present the need and implementation of access and identity management for endpoint protection and data security from PnP USB devices to maintain information security in a corporate network. General Terms Endpoint protection; Data security; IT security; Data Theft Prevention; Access and identity management.

  • Data Theft Prevention & endpoint protection from unauthorized USB devices — Implementation
    2012 Fourth International Conference on Advanced Computing (ICoAC), 2012
    Co-Authors: Saurabh Verma, Abhishek Singh
    Abstract:

    Podslurping is the intentional or unintentional use of a portable USB mass storage device, such as a USB flash drive (or “thumb drive”), to illicitly download and store confidential and proprietary data from network endpoint [1]. There are many establishments and organization that are unaware of, or choose to remain ignorant about the threat that can be caused by portable devices in their network setting until some events that can be from a minor unfortunate incident to a complete catastrophe. In the information age, cybercrime and information leakage increase, because endpoints are an easy target [2]. The key to managing portable devices in business environment is to give administrator direct control over what devices are in use on your network. In this paper we present the implementation of access and identity management for endpoint protection and data security from USB devices to maintain information security and data Theft Prevention in a corporate environment.

Saurabh Verma - One of the best experts on this subject based on the ideXlab platform.

  • data Theft Prevention endpoint protection from unauthorized usb devices implementation
    International Conference on Advanced Computing, 2012
    Co-Authors: Saurabh Verma, Abhishek Singh
    Abstract:

    Podslurping is the intentional or unintentional use of a portable USB mass storage device, such as a USB flash drive (or “thumb drive”), to illicitly download and store confidential and proprietary data from network endpoint [1]. There are many establishments and organization that are unaware of, or choose to remain ignorant about the threat that can be caused by portable devices in their network setting until some events that can be from a minor unfortunate incident to a complete catastrophe. In the information age, cybercrime and information leakage increase, because endpoints are an easy target [2]. The key to managing portable devices in business environment is to give administrator direct control over what devices are in use on your network. In this paper we present the implementation of access and identity management for endpoint protection and data security from USB devices to maintain information security and data Theft Prevention in a corporate environment.

  • Data Theft Prevention and Endpoint Protection from PnP Devices
    2012
    Co-Authors: Saurabh Verma, Rahul Lamba, Abhishek Singh, Amitesh Verma
    Abstract:

    Podslurping is the intentional or unintentional use of a portable USB mass storage device, such as a USB flash drive (or “thumb drive”), to illicitly download and store confidential and proprietary data from network endpoint.[1] Many organizations are unaware of, or choosing to ignore, the threat presented by portable devices in their network environment until some event, ranging from unfortunate to catastrophic, happens. In hard economic times, cybercrime and data leakage increase, finding an easy target in endpoints. The key to managing portable devices in business environment is to give administrator direct control over what devices are in use on your network. In this paper we present the need and implementation of access and identity management for endpoint protection and data security from PnP USB devices to maintain information security in a corporate network. General Terms Endpoint protection; Data security; IT security; Data Theft Prevention; Access and identity management.

  • Data Theft Prevention & endpoint protection from unauthorized USB devices — Implementation
    2012 Fourth International Conference on Advanced Computing (ICoAC), 2012
    Co-Authors: Saurabh Verma, Abhishek Singh
    Abstract:

    Podslurping is the intentional or unintentional use of a portable USB mass storage device, such as a USB flash drive (or “thumb drive”), to illicitly download and store confidential and proprietary data from network endpoint [1]. There are many establishments and organization that are unaware of, or choose to remain ignorant about the threat that can be caused by portable devices in their network setting until some events that can be from a minor unfortunate incident to a complete catastrophe. In the information age, cybercrime and information leakage increase, because endpoints are an easy target [2]. The key to managing portable devices in business environment is to give administrator direct control over what devices are in use on your network. In this paper we present the implementation of access and identity management for endpoint protection and data security from USB devices to maintain information security and data Theft Prevention in a corporate environment.

Amitesh Verma - One of the best experts on this subject based on the ideXlab platform.

  • Data Theft Prevention and Endpoint Protection from PnP Devices
    2012
    Co-Authors: Saurabh Verma, Rahul Lamba, Abhishek Singh, Amitesh Verma
    Abstract:

    Podslurping is the intentional or unintentional use of a portable USB mass storage device, such as a USB flash drive (or “thumb drive”), to illicitly download and store confidential and proprietary data from network endpoint.[1] Many organizations are unaware of, or choosing to ignore, the threat presented by portable devices in their network environment until some event, ranging from unfortunate to catastrophic, happens. In hard economic times, cybercrime and data leakage increase, finding an easy target in endpoints. The key to managing portable devices in business environment is to give administrator direct control over what devices are in use on your network. In this paper we present the need and implementation of access and identity management for endpoint protection and data security from PnP USB devices to maintain information security in a corporate network. General Terms Endpoint protection; Data security; IT security; Data Theft Prevention; Access and identity management.

Tara Lagu - One of the best experts on this subject based on the ideXlab platform.

  • medical identity Theft Prevention and reconciliation initiatives at massachusetts general hospital
    The Joint Commission Journal on Quality and Patient Safety, 2014
    Co-Authors: Timothy Judson, Tara Lagu, Mark Haas
    Abstract:

    Article-at-a-Glance Background Medical identity Theft refers to the misuse of another individual's identifying medical information to receive medical care. Beyond the financial burden on patients, hospitals, health insurance companies, and government insurance programs, undetected cases pose major patient safety challenges. Inaccuracies in the medical record may persist even after the Theft has been identified because of restrictions imposed by patient privacy laws. Massachusetts General Hospital (MGH; Boston) has conducted initiatives to prevent medical identity Theft and to better identify and respond to cases when they occur. Methods Since 2007, MGH has used a notification tree to standardize reporting of red flag incidents (warning signs of identity Theft, such as suspicious personal identifiers or account activity). A Data Integrity Dashboard allows for tracking and reviewing of all potential incidents of medical identity Theft to detect trends and targets for mitigation. An identity-checking policy, VERI-(Verify Everyone's Identity) Safe Patient Care, requires photo identification at every visit and follow-up if it is not provided. Results Data from MGH suggest that an estimated 120 duplicate medical records are created each month, 25 patient encounters are likely tied to identity Theft or fraud each quarter, and 14 patients are treated under the wrong medical record number each year. As of December 2013, 80%–85% of patients were showing photo identification at appointments. Conclusion Although an organization's policy changes and educational campaigns can improve detection and reconciliation of medical identity Theft cases, national policies should be implemented to streamline the process of correcting errors in medical records, reduce the financial disincentive for hospitals to detect and report cases, and create a single point of entry to reduce the burden on individuals and providers to reconcile cases.

  • Medical identity Theft: Prevention and reconciliation initiatives at massachusetts general hospital
    Joint Commission Journal on Quality and Patient Safety, 2014
    Co-Authors: Timothy Judson, Mark Haas, Tara Lagu
    Abstract:

    BACKGROUND: Medical identity Theft refers to the misuse of another individual's identifying medical information to receive medical care. Beyond the financial burden on patients, hospitals, health insurance companies, and government insurance programs, undetected cases pose major patient safety challenges. Inaccuracies in the medical record may persist even after the Theft has been identified because of restrictions imposed by patient privacy laws. Massachusetts General Hospital (MGH; Boston) has conducted initiatives to prevent medical identity Theft and to better identify and respond to cases when they occur. METHODS: Since 2007, MGH has used a notification tree to standardize reporting of red flag incidents (warning signs of identity Theft, such as suspicious personal identifiers or account activity). A Data Integrity Dashboard allows for tracking and reviewing of all potential incidents of medical identity Theft to detect trends and targets for mitigation. An identity-checking policy, VERI-(Verify Everyone's Identity) Safe Patient Care, requires photo identification at every visit and follow-up if it is not provided. RESULTS: Data from MGH suggest that an estimated 120 duplicate medical records are created each month, 25 patient encounters are likely tied to identity Theft or fraud each quarter, and 14 patients are treated under the wrong medical record number each year. As of December 2013, 80%-85% of patients were showing photo identification at appointments. CONCLUSION: Although an organization's policy changes and educational campaigns can improve detection and reconciliation of medical identity Theft cases, national policies should be implemented to streamline the process of correcting errors in medical records, reduce the financial disincentive for hospitals to detect and report cases, and create a single point of entry to reduce the burden on individuals and providers to reconcile cases.

Ammar Alazab - One of the best experts on this subject based on the ideXlab platform.

  • Designing Security Intelligent Agent for Petrol Theft Prevention
    2019 Cybersecurity and Cyberforensics Conference (CCC), 2019
    Co-Authors: Mahmoud Bakkar, Ammar Alazab
    Abstract:

    Automotive industry has increased exponentially in recent years, and the number of car drivers has increased in the street as well, that lead to the increasing demand for using fuel stations. The increasing demand causes an increase of Theft cases in the fuel stations particularly customers filling their cars and not paying for it. Although, there are several anti-petrol Theft initiatives which include the use of Closed-Circuit Television Cameras (CCTV) to recognize vehicle number plates or people's faces. However, the record shows that existing methods for detecting petrol Theft are less ineffective and time-consuming as it has been delayed in detecting the offenders and it is not a good measure to deter offenders as it is weak to be precise on evidence/mapping features. In this paper, Media Access Control (MAC) address detection of mobile devices used for preventing the petrol Theft. Mac addresses are extracted from the customer mobile devices to develop a framework that can prevent and detect petrol Theft. Also, car plate number is captured as well to develop this framework.

  • CCC - Designing Security Intelligent Agent for Petrol Theft Prevention
    2019 Cybersecurity and Cyberforensics Conference (CCC), 2019
    Co-Authors: Mahmoud Bakkar, Ammar Alazab
    Abstract:

    Automotive industry has increased exponentially in recent years, and the number of car drivers has increased in the street as well, that lead to the increasing demand for using fuel stations. The increasing demand causes an increase of Theft cases in the fuel stations particularly customers filling their cars and not paying for it. Although, there are several anti-petrol Theft initiatives which include the use of Closed-Circuit Television Cameras (CCTV) to recognize vehicle number plates or people's faces. However, the record shows that existing methods for detecting petrol Theft are less ineffective and time-consuming as it has been delayed in detecting the offenders and it is not a good measure to deter offenders as it is weak to be precise on evidence/mapping features. In this paper, Media Access Control (MAC) address detection of mobile devices used for preventing the petrol Theft. Mac addresses are extracted from the customer mobile devices to develop a framework that can prevent and detect petrol Theft. Also, car plate number is captured as well to develop this framework.