Published January 31, 2018 | Version v1
Journal article Open

UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS

  • 1. 1Department of Electrical & Computer Engineering, University of Delaware, Newark 2University of Delaware, Newark, USA
  • 2. Department of Electrical & Computer Engineering, University of Delaware, Newark

Description

Modern information security management best practices dictate that an enterprise assumes full configuration control of end user computer systems (laptops, deskside computers, etc.). The benefit of this explicit control yields lower support costs since there are less variation of machines, operating systems, and applications to provide support on, but more importantly today, dictating specifically what software, hardware, and security configurations exist on an end user's machine can help reduce the occurrence of infection by malicious software significantly. If the data pertaining to end user systems is organized and catalogued as part of normal information security logging activities, an extended picture of what the end system actually is may be available to the investigator at a moment's notice to enhance incident response and mitigation. The purpose of this research is to provide a way of cataloguing this data by using and augmenting existing tools and open source software deployed in an enterprise network.

Files

10218ijnsa01.pdf

Files (1.8 MB)

Name Size Download all
md5:fb678b269ca1f8c2ed201f968f745558
1.8 MB Preview Download