Skip to main content

Comprehensive Study in Preventive Measures of Data Breach Using Thumb-Sucking

  • Conference paper
  • First Online:
Future Data and Security Engineering (FDSE 2018)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 11251))

Included in the following conference series:

  • 987 Accesses

Abstract

This research presents a method of data breach that is known as thumb-sucking. Through the insertion of a flash drive into a computer’s USB port, it allows for the extraction of the user’s private information. In order to protect against the possibility of data breach in the form of thumb-sucking, the researchers have devised preventive measures in order to protect a user from malicious hackers. These measures include testing on various Windows operating systems that are in use, mainly Windows 7, Windows 8.1, Windows 10 and some Linux platform. The choice of conducting tests on Windows is due to the problem that not all users of Windows are tech savvy enough to avoid their data being accessed without permission.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Five Solutions for Improving Your Organization’s Data Security. Kanguru, Secure. Anytime. Anywhere (2016)

    Google Scholar 

  2. Huq, N.: Follow the data: analyzing breaches by industry. TrendLabs Research Paper (2015)

    Google Scholar 

  3. Protecting the confidentiality of personal data, guidance note. Department of Finance (2008)

    Google Scholar 

  4. Data Protection and Breach. Online Trust Alliance (2015)

    Google Scholar 

  5. Internet Security Threat report. Symantec Corporation (2014)

    Google Scholar 

  6. Crews, C.W. Jr., Oberwetter, B.: Preventing identity theft and data security breaches: the problem with regulation. Competitive Enterprise Institute (2006)

    Google Scholar 

  7. Cheng, L., Liu, F., Yao, D.: Enterprise data breach: causes, challenges, prevention, and future directions. WIREs Data Min. Knowl. Discov. 7, 1–14 (2017)

    Google Scholar 

  8. Basic Cybersecurity Measures. WaterISAC (2015)

    Google Scholar 

  9. Vaizey, E.: 2015 Information Security Breaches Survey. HM Government (2015)

    Google Scholar 

  10. Investing in Human Firewall. Lawroom (2014)

    Google Scholar 

  11. Clark, J, Stavrou, A.: Breaching & Protecting an Anonymizing Network System. In: Annual Symposium on Information Assurance (2011)

    Google Scholar 

  12. Frost, S.: Could a data breach cause your business to fail? Faronics

    Google Scholar 

  13. Yadav, T., Rao, A.M.: Technical aspects of cyber kill chain. In: Abawajy, J.H., Mukherjea, S., Thampi, S.M., Ruiz-Martínez, A. (eds.) SSCC 2015. CCIS, vol. 536, pp. 438–452. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-22915-7_40

    Chapter  Google Scholar 

  14. Schmidt, M., Fahl, S., Schwarzkopf, R., Freisleben, B.: TrustBox: a security architecture for preventing data breaches

    Google Scholar 

  15. Nandhakumar, C., Ranjithprabhu, K., Raja, M.: Counter measures for data breach in cloud computing. Int. J. Res. Comput. Appl. Robot. 2, 124–129 (2014)

    Google Scholar 

  16. Balazs, Z., Effitas, M.: Breach detection system testing methodology

    Google Scholar 

  17. Chamorro, E., Han, J., Beheshti, M.: The design and implementation of an antivirus software advising system. In: Ninth International Conference on Information Technology (2012)

    Google Scholar 

  18. Min, B., Varadharajan, M., Tupakula, U., Hitchens, M.: Antivirus security: naked during updates. Softw. – Pract. Exp. Wiley Online Library (2013)

    Google Scholar 

  19. Wressnegger, C., Freeman, K., Yamaguchi, F., Rieck, K.: Automatically inferring malware signatures for anti-virus assisted attacks. In: Asia CCS (2017)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Keinaz Domingo or Froilan De Guzman .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Domingo, K., Cruz, B., De Guzman, F., Cotiangco, J., Hilario, C. (2018). Comprehensive Study in Preventive Measures of Data Breach Using Thumb-Sucking. In: Dang, T., Küng, J., Wagner, R., Thoai, N., Takizawa, M. (eds) Future Data and Security Engineering. FDSE 2018. Lecture Notes in Computer Science(), vol 11251. Springer, Cham. https://doi.org/10.1007/978-3-030-03192-3_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-03192-3_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-03191-6

  • Online ISBN: 978-3-030-03192-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics