Threat Vector Segregation for Endpoint Security

Abstract: With X number of companies working for cybersecurity, Y number of products, and Z number of solutions, till date we rely on restricting users from visiting any unknown/malicious websites or unknown/malicious links on the corporate machine [Laptop]. Considering the threat vector of an Endpoint connecting to the internet in this paper, we are formulating a solution for the problem, by segregating the threat vector from the endpoints and giving extended access to the user to perform all the activity. The proposed solution will also ease the working of an IT management team in case of any malware infection to the endpoints, in a matter of seconds the endpoints can be back online working, downtime of network or machines will be minimal. The proposed solution can also be utilized for training the cybersecurity engineers, with the example of the live malware infection and propagation without affecting the corporate endpoint or the network.

Keywords: Endpoint Security, Laptop, Minimal Downtime, Threat Vector Segregation, Unknown-Unknowns, Virtualization, Zero-day

Published in: International Journal of Scientific and Engineering Research (IJSER- August 2021 Volume 12-Issue 7)

AUTHORS

Sagar G


Leave a Reply

Your email address will not be published. Required fields are marked *