Skip to main content

Protection Management of Enterprise Endpoint Based on the ITIL Management Framework

  • Conference paper
Information Technology Convergence

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 253))

  • 1247 Accesses

Abstract

There are many endpoints such as notebooks and desktop computers in the internal environment of modern enterprise. However, convenient network applications accompanied by the threat of various forms of information, such as computer viruses, spyware, operating system vulnerabilities, a malicious web site, attack of malware. The endpoints are the largest number of the subject in the corporate computer environment. If information threats affect the endpoint operation, the business operations and revenue will suffer the loss. The main purpose of this study is focus on the endpoint protection for enterprises. The research adopts ITIL management framework approach to provide endpoint protection management and assessment methodology of effectiveness. The proposed approach could be regarded as planning reference for information department during endpoint protection management. Besides, the proposed approach provides protection mechanisms for enterprise endpoint to reduce the impact from information threats.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Symantec: Internet Security Threat Report (ISTR). vol. 17(2011)

    Google Scholar 

  2. Jelliti M, Sibilla M, Jamoussi Y, Ghezala HB (2010) A model based framework supporting ITIL service IT management. In: Bider, et al. (eds) BPMDS 2010 and EMMSAD 2010. LNBIP, vol. 50. Springer-Verlag, Berlin Heidelberg, p 208–219

    Google Scholar 

  3. The IT Service Management Forum, An introductory overview of ITIL V3, http://www.best-management-practice.com/gempdf/itsmf_an_introductory_overview_of_itilv3.pdf

  4. Marrone M, Kolbe LM (2011) Impact of IT service management frameworks on the IT organization: an empirical study on benefits, challenges, and processes. Bus Inform Syst Eng 3(1)

    Google Scholar 

  5. McFarlane I, Dugmore J (2006) IT service management self assessment workbook, 2nd edn. British Standards Institute, London

    Google Scholar 

  6. APM Group Ltd, ITIL Management, http://www.itil-officialsite.com

  7. Computer Aid, Inc, ITIL V3 Service Life Cycle, http://www.itservicemanagement-itil.com/category/it-service-management-cat/itil-v3-life-cycle/

  8. WisdomFish.ORG, ITIL V3 Structure, http://java.wisdomfish.org/soa/soa-design-patterns/itil-v3

  9. Alhabeeb M, Almuhaideb A, Le PD, Srinivasan B (2010) Information security threats classification pyramid. In: 2010 IEEE 24th international conference on advanced information networking and applications workshops, p 208–213

    Google Scholar 

  10. Guttman B, Roback E (1995) An introduction to computer security: the NIST handbook. Diane Pub Co

    Google Scholar 

  11. Morales JA, Al-Bataineh A, Xu S, Sandhu R (2010) Analyzing and exploiting network behaviors of malware. In: Jajodia S, Zhou J (eds) SecureComm 2010. LNICST, vol. 50. Springer, Berlin, Heidelberg, p 20–34

    Google Scholar 

  12. Sinchai C (2008) Multiple logs analysis for detecting zero-day backdoor trojans. Cleveland State University, Cleveland

    Google Scholar 

  13. Wagener G, State R, Dulaunoy A (2008) Malware behaviour analysis. J Comput Virol 4:279–287

    Article  Google Scholar 

  14. Zhang Y, Song L, He Y (2011) A novel immune-inspired method for malicious code extraction and detection. In: Zhang J (ed) ICAIC 2011. CCIS, vol. 226. Springer-Verlag, Berlin, Heidelberg, p 501–509

    Google Scholar 

  15. ISO/IEC 27001. (2005) Information Technology—Security Techniques—Information Security Management Systems—.Requirements

    Google Scholar 

  16. Santos I, Brezo F, Nieves J, Penya YK, Sanz B, Laorden C, Bringas PG (2010) Idea: opcode-sequence-based malware detection. In: Massacci F, Wallach D, Zannone N (eds) ESSoS 2010. LNCS, vol. 5965. Springer-Verlag, Berlin, Heidelberg, p 35–43

    Google Scholar 

  17. Santos I, Nieves J, Bringas PG (2011) Semi-supervised learning for unknown malware detection. In Abraham A, Corchado JM, Rodríguez González S, de Paz Santana, JF (eds) International symposium on DCAI. AISC, vol. 91. Springer-Verlag, Berlin, Heidelberg, p 415–422

    Google Scholar 

  18. Santos I, Sanz B, Laorden C, Brezo F, Bringas PG (2011) Opcode-sequence-based semi-supervised unknown malware detection. In Herrero A, Corchado E (eds.) CISIS 2011. LNCS, vol. 6694. Springer-Verlag, Berlin, Heidelberg, p 50–57

    Google Scholar 

  19. Ye Y, Wang D, Li T, Ye D, Jiang Q (2008) An intelligent PE-malware detection system based on association mining. J Comput Virol 4:323–334

    Article  Google Scholar 

  20. Vilarinho S (2003) Miguel Mira da Silva: risk management model in ITIL. Commun Comp Inform Sci 220:306–314

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mei-Yu Wu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer Science+Business Media Dordrecht

About this paper

Cite this paper

Wu, MY., Chang, SF., Li, WC. (2013). Protection Management of Enterprise Endpoint Based on the ITIL Management Framework. In: Park, J.J., Barolli, L., Xhafa, F., Jeong, H.Y. (eds) Information Technology Convergence. Lecture Notes in Electrical Engineering, vol 253. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-6996-0_59

Download citation

  • DOI: https://doi.org/10.1007/978-94-007-6996-0_59

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-94-007-6995-3

  • Online ISBN: 978-94-007-6996-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics