Abstract
This research presents a method of data breach that is known as thumb-sucking. Through the insertion of a flash drive into a computer’s USB port, it allows for the extraction of the user’s private information. In order to protect against the possibility of data breach in the form of thumb-sucking, the researchers have devised preventive measures in order to protect a user from malicious hackers. These measures include testing on various Windows operating systems that are in use, mainly Windows 7, Windows 8.1, Windows 10 and some Linux platform. The choice of conducting tests on Windows is due to the problem that not all users of Windows are tech savvy enough to avoid their data being accessed without permission.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Five Solutions for Improving Your Organization’s Data Security. Kanguru, Secure. Anytime. Anywhere (2016)
Huq, N.: Follow the data: analyzing breaches by industry. TrendLabs Research Paper (2015)
Protecting the confidentiality of personal data, guidance note. Department of Finance (2008)
Data Protection and Breach. Online Trust Alliance (2015)
Internet Security Threat report. Symantec Corporation (2014)
Crews, C.W. Jr., Oberwetter, B.: Preventing identity theft and data security breaches: the problem with regulation. Competitive Enterprise Institute (2006)
Cheng, L., Liu, F., Yao, D.: Enterprise data breach: causes, challenges, prevention, and future directions. WIREs Data Min. Knowl. Discov. 7, 1–14 (2017)
Basic Cybersecurity Measures. WaterISAC (2015)
Vaizey, E.: 2015 Information Security Breaches Survey. HM Government (2015)
Investing in Human Firewall. Lawroom (2014)
Clark, J, Stavrou, A.: Breaching & Protecting an Anonymizing Network System. In: Annual Symposium on Information Assurance (2011)
Frost, S.: Could a data breach cause your business to fail? Faronics
Yadav, T., Rao, A.M.: Technical aspects of cyber kill chain. In: Abawajy, J.H., Mukherjea, S., Thampi, S.M., Ruiz-MartÃnez, A. (eds.) SSCC 2015. CCIS, vol. 536, pp. 438–452. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-22915-7_40
Schmidt, M., Fahl, S., Schwarzkopf, R., Freisleben, B.: TrustBox: a security architecture for preventing data breaches
Nandhakumar, C., Ranjithprabhu, K., Raja, M.: Counter measures for data breach in cloud computing. Int. J. Res. Comput. Appl. Robot. 2, 124–129 (2014)
Balazs, Z., Effitas, M.: Breach detection system testing methodology
Chamorro, E., Han, J., Beheshti, M.: The design and implementation of an antivirus software advising system. In: Ninth International Conference on Information Technology (2012)
Min, B., Varadharajan, M., Tupakula, U., Hitchens, M.: Antivirus security: naked during updates. Softw. – Pract. Exp. Wiley Online Library (2013)
Wressnegger, C., Freeman, K., Yamaguchi, F., Rieck, K.: Automatically inferring malware signatures for anti-virus assisted attacks. In: Asia CCS (2017)
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this paper
Cite this paper
Domingo, K., Cruz, B., De Guzman, F., Cotiangco, J., Hilario, C. (2018). Comprehensive Study in Preventive Measures of Data Breach Using Thumb-Sucking. In: Dang, T., Küng, J., Wagner, R., Thoai, N., Takizawa, M. (eds) Future Data and Security Engineering. FDSE 2018. Lecture Notes in Computer Science(), vol 11251. Springer, Cham. https://doi.org/10.1007/978-3-030-03192-3_5
Download citation
DOI: https://doi.org/10.1007/978-3-030-03192-3_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-03191-6
Online ISBN: 978-3-030-03192-3
eBook Packages: Computer ScienceComputer Science (R0)