Abstract
There are many endpoints such as notebooks and desktop computers in the internal environment of modern enterprise. However, convenient network applications accompanied by the threat of various forms of information, such as computer viruses, spyware, operating system vulnerabilities, a malicious web site, attack of malware. The endpoints are the largest number of the subject in the corporate computer environment. If information threats affect the endpoint operation, the business operations and revenue will suffer the loss. The main purpose of this study is focus on the endpoint protection for enterprises. The research adopts ITIL management framework approach to provide endpoint protection management and assessment methodology of effectiveness. The proposed approach could be regarded as planning reference for information department during endpoint protection management. Besides, the proposed approach provides protection mechanisms for enterprise endpoint to reduce the impact from information threats.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Symantec: Internet Security Threat Report (ISTR). vol. 17(2011)
Jelliti M, Sibilla M, Jamoussi Y, Ghezala HB (2010) A model based framework supporting ITIL service IT management. In: Bider, et al. (eds) BPMDS 2010 and EMMSAD 2010. LNBIP, vol. 50. Springer-Verlag, Berlin Heidelberg, p 208–219
The IT Service Management Forum, An introductory overview of ITIL V3, http://www.best-management-practice.com/gempdf/itsmf_an_introductory_overview_of_itilv3.pdf
Marrone M, Kolbe LM (2011) Impact of IT service management frameworks on the IT organization: an empirical study on benefits, challenges, and processes. Bus Inform Syst Eng 3(1)
McFarlane I, Dugmore J (2006) IT service management self assessment workbook, 2nd edn. British Standards Institute, London
APM Group Ltd, ITIL Management, http://www.itil-officialsite.com
Computer Aid, Inc, ITIL V3 Service Life Cycle, http://www.itservicemanagement-itil.com/category/it-service-management-cat/itil-v3-life-cycle/
WisdomFish.ORG, ITIL V3 Structure, http://java.wisdomfish.org/soa/soa-design-patterns/itil-v3
Alhabeeb M, Almuhaideb A, Le PD, Srinivasan B (2010) Information security threats classification pyramid. In: 2010 IEEE 24th international conference on advanced information networking and applications workshops, p 208–213
Guttman B, Roback E (1995) An introduction to computer security: the NIST handbook. Diane Pub Co
Morales JA, Al-Bataineh A, Xu S, Sandhu R (2010) Analyzing and exploiting network behaviors of malware. In: Jajodia S, Zhou J (eds) SecureComm 2010. LNICST, vol. 50. Springer, Berlin, Heidelberg, p 20–34
Sinchai C (2008) Multiple logs analysis for detecting zero-day backdoor trojans. Cleveland State University, Cleveland
Wagener G, State R, Dulaunoy A (2008) Malware behaviour analysis. J Comput Virol 4:279–287
Zhang Y, Song L, He Y (2011) A novel immune-inspired method for malicious code extraction and detection. In: Zhang J (ed) ICAIC 2011. CCIS, vol. 226. Springer-Verlag, Berlin, Heidelberg, p 501–509
ISO/IEC 27001. (2005) Information Technology—Security Techniques—Information Security Management Systems—.Requirements
Santos I, Brezo F, Nieves J, Penya YK, Sanz B, Laorden C, Bringas PG (2010) Idea: opcode-sequence-based malware detection. In: Massacci F, Wallach D, Zannone N (eds) ESSoS 2010. LNCS, vol. 5965. Springer-Verlag, Berlin, Heidelberg, p 35–43
Santos I, Nieves J, Bringas PG (2011) Semi-supervised learning for unknown malware detection. In Abraham A, Corchado JM, RodrÃguez González S, de Paz Santana, JF (eds) International symposium on DCAI. AISC, vol. 91. Springer-Verlag, Berlin, Heidelberg, p 415–422
Santos I, Sanz B, Laorden C, Brezo F, Bringas PG (2011) Opcode-sequence-based semi-supervised unknown malware detection. In Herrero A, Corchado E (eds.) CISIS 2011. LNCS, vol. 6694. Springer-Verlag, Berlin, Heidelberg, p 50–57
Ye Y, Wang D, Li T, Ye D, Jiang Q (2008) An intelligent PE-malware detection system based on association mining. J Comput Virol 4:323–334
Vilarinho S (2003) Miguel Mira da Silva: risk management model in ITIL. Commun Comp Inform Sci 220:306–314
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer Science+Business Media Dordrecht
About this paper
Cite this paper
Wu, MY., Chang, SF., Li, WC. (2013). Protection Management of Enterprise Endpoint Based on the ITIL Management Framework. In: Park, J.J., Barolli, L., Xhafa, F., Jeong, H.Y. (eds) Information Technology Convergence. Lecture Notes in Electrical Engineering, vol 253. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-6996-0_59
Download citation
DOI: https://doi.org/10.1007/978-94-007-6996-0_59
Publisher Name: Springer, Dordrecht
Print ISBN: 978-94-007-6995-3
Online ISBN: 978-94-007-6996-0
eBook Packages: EngineeringEngineering (R0)