Enhanced Enterprise Device Theft Detection System

Abstract

Issues regarding device security have been highlighted by the increasing use of devices for information access in a variety of situations, particularly in the context of rising laptop theft. By implementing an Enhanced Enterprise Device Theft Detection System at universities, this research explores how to protect both the device itself and the data it contains. To prevent illegal access to or theft of computers and tablets, this innovative approach combines the strength of CCTV cameras with mobile applications. Users and security professionals are immediately informed of possible thefts using this complete system, enabling fast response. This system's technique, which includes user identification, "Away Mode" activation, real-time image gathering, alarm triggering, and the possibility to follow thieves' location, is the focus of the research. To ensure the system's performance, security, scalability, usability, stability, maintainability, and compatibility, this article also tackles the system's non-functional needs. This solution demonstrates a strong strategy for protecting devices and preventing data breaches by combining modern technology with a meticulously created operational architecture. Beyond just the individual user, it has consequences for businesses and organizations as well, thereby reducing risks, boosting security, and strengthening the fundamental foundation of our linked digital world.

Country : Sri Lanka

1 Basnayake B.M.N.K.2 Pinto N.V.C.3 Bulugammana B.M.P.P.4 Wijerathne W.N.D.5 Ms. Thamali Dassanayake6 Mr. Uditha Dharmakeerthi

  1. Department of Computer Systems Engineering, Sri Lanka Institute of Information Technology, Sri Lanka
  2. Department of Computer Systems Engineering, Sri Lanka Institute of Information Technology, Sri Lanka
  3. Department of Computer Systems Engineering, Sri Lanka Institute of Information Technology, Sri Lanka
  4. Department of Computer Systems Engineering, Sri Lanka Institute of Information Technology, Sri Lanka
  5. Department of Information Technology, Sri Lanka Institute of Information Technology, Sri Lanka
  6. Department of Computer Science and Network Engineering, Sri Lanka Institute of Information Technology, Sri Lanka

IRJIET, Volume 7, Issue 9, September 2023 pp. 137-144

doi.org/10.47001/IRJIET/2023.709016

References

  1. A Communications, "Arrowhead General Insurance Agency, Inc.," Back-to-school laptop and mobile device security measures, 2023.
  2. "SoSafe," What Are Brute-Force Attacks?: Examples & Prevention Tips, 2023.
  3. "Common (and uncommon) approaches to preventing the theft of computers, laptops and tablets in schools," [Online]. Available: https://blogs.worldbank.org/edutech/computer-theft-schools. [Accessed 12 08 2023].
  4. "Image processing in the context of a visual model - university of utah," [Online]. Available: https://www.math.utah.edu/~gustafso/s2013/3150/pdeNotes/Artigo_Stockham_01450712.pdf. [Accessed 12 08 2023].
  5. "Cybersecurity Guide: Fundamentals of Cybersecurity Topics," [Online]. Available: https://www.xcitium.com/cybersecurity/. [Accessed 12 08 2023].
  6. H. Dhaduk, "Support Vector Machine and Principal Component Analysis Tutorial for beginners," [Online]. Available: https://www.analyticsvidhya.com/blog/2021/07/svm-and-pca-tutorial-for-beginners/. [Accessed 12 08 2023].
  7. T. Contributor, "What is CCTV (closed circuit television)?: Definition from TechTarget," [Online]. Available: https://www.techtarget.com/whatis/definition/CCTV-closed-circuit-television. [Accessed 13 08 2023].
  8. P. Vennam, "Attacks and preventive measures on video surveillance systems: A Review," Applied Sciences, 2021.
  9. "Keylogger: How they work and how to detect them," Knowledge Hut, 2023.
  10. Y. Muliono, "Keystroke Dynamic Classification Using Machine Learning for password authorization," Procedia Computer Science, 2018.
  11. "Mouse Dynamics," Typing DNA, 2023.
  12. M. Antal, "Intrusion detection using Mouse Dynamics," IET Biometrics, 2019.
  13. “Laptop theft prevention and recovery,” Department of Public Safety, 18-May-2015. [Online]. Available: https://dps.usc.edu/services/laptops/. [Accessed: 27-Aug-2023].
  14. “Laptop theft prevention,” Public Safety | Brown University. [Online]. Available: https://dps.brown.edu/crime-prevention/safety-tips/laptop-theft-prevention. [Accessed: 27-Aug-2023].
  15. “Laptop theft prevention,” Harvard.edu. [Online]. Available: https://www.hupd.harvard.edu/laptop-theft-prevention. [Accessed: 27-Aug-2023].
  16. R. Giot, M. El-Abed, and C. Rosenberger, “Keystroke dynamics overview,” in Biometrics, In Tech, 2011.
  17. Researchgate.net. [Online]. Available: https://www.researchgate.net/publication/221912833_Keystroke_Dynamics_Overview. [Accessed: 27-Aug-2023].
  18. Researchgate.net. [Online]. Available: https://www.researchgate.net/publication/306062718_Enhanced_keystroke_dynamics_authentication_utilizing_pressure_detection. [Accessed: 27-Aug-2023].