Fall 2008 Internet2 Member Meeting

close
Use Internet2 SiteID

Already have an Internet2 SiteID?
Sign in here.

Internet2 SiteID

Your organization not listed? Create a local account to use Internet2 services.

Create SiteID

Concerns in the Use of Endpoint Agent Security Tools

Time 10/14/08 04:30PM-05:30PM

Session Abstract

In the interest of online security and asset management, IT professionals may ask users to install agent-based tools that can help. Examples include asset management tools that are able to take an inventory of installed software, or virus protection tools and network access control tools that watch the activity on network interfaces and sift through stored file names and contents for signs of compromise or infection. The functionality is often achieved through the use of "agent" software that the users are asked to install. This agent software acts on the endpoint computer with at least the privileges of the primary user, and often with full administrator or "super user" privileges. In this session, we explore some of the security, privacy and related risks associated with such deployments.

Speakers

Speaker Dikran Kassabian University of Pennsylvania

Presentation Media

media item thumbnail Concerns in the use of Endpoint Agent Security Tools (pdf)

Speaker Dikran Kassabian University of Pennsylvania

Speaker Nicholas Thompson The Ohio State University

Secondary tracks System and Network Security for Advanced Networks

gold Sponsors

bronze Sponsors

Food and Beverage Sponsors