USB Detection in Industrial Espionage Cases
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 122 | Views: 271

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 5 Issue 5, May 2016 | Popularity: 6.6 / 10


     

USB Detection in Industrial Espionage Cases

Aparna Chandran, Harsha V


Abstract: Industrial Espionage is the covert and illegal practice of investigating competitors to gain a business advantage. The target of industrial espionage might be a trade secret such as a proprietary product specification or formula, or information about business plans. Nowadays USB plays a leading role in Industrial espionage. Employees can easily access systems and there is a chance of thefting confidential data and that may cause problem. Here I introduce a new concept which provides a way to store USB details in central server system and the method runs in client systems without the knowledge of employees. The method will retrieve every information about the USB drive whenever it is mounted in any of the system which is useful to verify the data theft team.


Keywords: USB, Registry, Backup, Data Transfer, Industrial Espionage


Edition: Volume 5 Issue 5, May 2016


Pages: 198 - 200


DOI: https://www.doi.org/10.21275/NOV163237



Make Sure to Disable the Pop-Up Blocker of Web Browser


Text copied to Clipboard!
Aparna Chandran, Harsha V, "USB Detection in Industrial Espionage Cases", International Journal of Science and Research (IJSR), Volume 5 Issue 5, May 2016, pp. 198-200, https://www.ijsr.net/getabstract.php?paperid=NOV163237, DOI: https://www.doi.org/10.21275/NOV163237

Similar Articles

Downloads: 99

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1939 - 1946

An Approach for Video Compression Technique for Efficient Data Backup and Recovery in Public Cloud

Nagaraj S Kolhar, Dr. Suvarna Nandyal

Share this Article

Downloads: 100

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1058 - 1060

Data Integrity Proof in Cloud Computing using TPA with Privacy Preserving

Rushikesh P. Dhanokar

Share this Article

Downloads: 100

Research Paper, Computer Science & Engineering, Ghana, Volume 4 Issue 2, February 2015

Pages: 2448 - 2452

Reliable and Rapid Routing Configurations for Network Recovery

William Asiedu K. O. Boateng

Share this Article

Downloads: 102

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1011 - 1013

Transplantation of Native Android Apps onto J2ME Platform

Revati M. Wahul, Meenakshi Chandak, Neha Pandit, Kalyani Mote

Share this Article

Downloads: 105

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 1952 - 1955

Ultra Wideband on High Speed Wireless Personal Area Networks

A. S. Syed Navaz, G. M. Kadhar Nawaz

Share this Article
Top