SlideShare a Scribd company logo
USB PHYSICAL PORTS SECURITY USING PYTHON
AGENDA
• To develop a Graphical User Interface (GUI) application for user
authentication and USB port control.
• The system would allow users to enter password, and upon successful
validation, it would lock or unlock the USB ports.
• Prevent confidential information from being copied to unauthorized
removable storage devices and minimize the risk of data loss and data leaks.
• Get protection against the spread of USB malware and potential data
breaches with an effective USB port lock software
PROBLEMS WITH USB
• Malware infections: Unintentional infection occurs when someone inserts an unprotected
USB device into a compromised system. In an intentional infection, someone knowingly
infects a device in order to connect it to a system and harm sensitive data.
• USB device spoofing: The USB drive contains software that tricks the computer into
thinking a keyboard is attached. The drive then injects keystrokes to command the
computer to install malware.
• BadUSB attacks: BadUSB is a computer security attack using USB devices that are
programmed with malicious software.
PROJECT OVERVIEW
• Develop a user-friendly GUI for login and password entry.
• Implement a secure authentication process to verify user credentials.
• Control the USB ports based on authentication status.
• Enhance system security by restricting access to USB ports.
PROJECT REQUIREMENTS
• Python IDE: An Integrated Development Environment(IDE) is a program dedicated
to software development. As the name implies, IDEs integrate several tools
specifically designed for software development.
• Python Libraries: A Python library is a collection of related modules. It contains
bundles of code that can be used repeatedly in different programs. It makes Python
Programming simpler and convenient for the programmer and some of
the Libraries used in this are: tkinter, Subprocess, os.
WHO ARE THE END USERS?
•Enterprises and Organizations
•IT Administrators
•Healthcare Institutions
•Financial Institutions
•Educational Institutions
•Government Agencies
•Personal Users
FUTURE ENHANCEMENT
•Audit and Reporting: Implement an auditing feature that logs USB port
activities including lock and unlock events, connected devices, and user actions. This
helps organizations track and monitor USB usage, identify potential security breaches
or policy violations, and generate reports for compliance purposes.
•Remote Locking and Unlocking: Enable the capability to remotely lock or unlock USB
ports on managed devices. This can be useful for scenarios where devices are lost,
stolen
•Intelligent Threat Detection: Incorporate intelligent threat detection mechanisms that
analyze USB device behavior and identify potential security risks.
CONCLUSION
•The development of a GUI for USB port locking and unlocking with user validation brings
several significant benefits to enhancing USB port security.
•By implementing user validation as an additional layer of protection, organizations can
effectively control access to USB ports and mitigate potential risks associated with
unauthorized data transfer, malware introduction, and data leakage.
•By creating a GUI for USB port locking and unlocking with user validation, organizations can
take proactive steps to safeguard their networks, protect valuable data assets, and maintain
compliance with data security regulations.
THANK YOU

More Related Content

Similar to USB Physical Ports Security Using Python

Cyber security
Cyber securityCyber security
Cyber security
Arjun Chetry
 
Hardware Authentication
Hardware AuthenticationHardware Authentication
Hardware Authentication
Coder Tech
 
Ch15 power point
Ch15 power pointCh15 power point
Ch15 power pointbodo-con
 
Isolation Platform - Data Sheet
Isolation Platform - Data SheetIsolation Platform - Data Sheet
Isolation Platform - Data Sheet
Sutedjo Tjahjadi
 
Ce hv6 module 55 preventing data loss
Ce hv6 module 55 preventing data lossCe hv6 module 55 preventing data loss
Ce hv6 module 55 preventing data loss
Vi Tính Hoàng Nam
 
Fundamental Best Practices in Secure IoT Product Development
Fundamental Best Practices in Secure IoT Product DevelopmentFundamental Best Practices in Secure IoT Product Development
Fundamental Best Practices in Secure IoT Product Development
Mark Szewczul, CISSP
 
System Security Sem 2(Module 1).pptx
System Security Sem 2(Module     1).pptxSystem Security Sem 2(Module     1).pptx
System Security Sem 2(Module 1).pptx
rahulkumarcscsf21
 
Data/File Security & Control
Data/File Security & ControlData/File Security & Control
Data/File Security & Control
Adetula Bunmi
 
What is kiosk system software?
What is kiosk system software? What is kiosk system software?
What is kiosk system software?
KioWare Kiosk Software
 
Software Security
Software SecuritySoftware Security
Software Security
AkNirojan
 
IIoT Endpoint Security
IIoT Endpoint Security IIoT Endpoint Security
IIoT Endpoint Security
Industrial Internet Consortium
 
IRJET- Implementation of Anti-Drive
IRJET- Implementation of Anti-DriveIRJET- Implementation of Anti-Drive
IRJET- Implementation of Anti-Drive
IRJET Journal
 
Steve brueckner-atc-ny
Steve brueckner-atc-nySteve brueckner-atc-ny
Steve brueckner-atc-nyjcaire
 
43 automatic
43 automatic43 automatic
43 automatic
aissmsblogs
 
Best practices to secure Windows10 with already included features
Best practices to secure Windows10 with already included featuresBest practices to secure Windows10 with already included features
Best practices to secure Windows10 with already included features
Alexander Benoit
 
IoT-Device-Security.pptx
IoT-Device-Security.pptxIoT-Device-Security.pptx
IoT-Device-Security.pptx
ZahidHussainqaisar
 
Security Testing for IoT Systems
Security Testing for IoT SystemsSecurity Testing for IoT Systems
Security Testing for IoT Systems
Security Innovation
 
Best Practices For Securing Your Software Applications.pdf
Best Practices For Securing Your Software Applications.pdfBest Practices For Securing Your Software Applications.pdf
Best Practices For Securing Your Software Applications.pdf
Bahaa Al Zubaidi
 
Chapter 13
Chapter 13Chapter 13
Chapter 13bodo-con
 

Similar to USB Physical Ports Security Using Python (20)

Cyber security
Cyber securityCyber security
Cyber security
 
Hardware Authentication
Hardware AuthenticationHardware Authentication
Hardware Authentication
 
Ch15 power point
Ch15 power pointCh15 power point
Ch15 power point
 
Isolation Platform - Data Sheet
Isolation Platform - Data SheetIsolation Platform - Data Sheet
Isolation Platform - Data Sheet
 
Ce hv6 module 55 preventing data loss
Ce hv6 module 55 preventing data lossCe hv6 module 55 preventing data loss
Ce hv6 module 55 preventing data loss
 
Fundamental Best Practices in Secure IoT Product Development
Fundamental Best Practices in Secure IoT Product DevelopmentFundamental Best Practices in Secure IoT Product Development
Fundamental Best Practices in Secure IoT Product Development
 
Virusppt
ViruspptVirusppt
Virusppt
 
System Security Sem 2(Module 1).pptx
System Security Sem 2(Module     1).pptxSystem Security Sem 2(Module     1).pptx
System Security Sem 2(Module 1).pptx
 
Data/File Security & Control
Data/File Security & ControlData/File Security & Control
Data/File Security & Control
 
What is kiosk system software?
What is kiosk system software? What is kiosk system software?
What is kiosk system software?
 
Software Security
Software SecuritySoftware Security
Software Security
 
IIoT Endpoint Security
IIoT Endpoint Security IIoT Endpoint Security
IIoT Endpoint Security
 
IRJET- Implementation of Anti-Drive
IRJET- Implementation of Anti-DriveIRJET- Implementation of Anti-Drive
IRJET- Implementation of Anti-Drive
 
Steve brueckner-atc-ny
Steve brueckner-atc-nySteve brueckner-atc-ny
Steve brueckner-atc-ny
 
43 automatic
43 automatic43 automatic
43 automatic
 
Best practices to secure Windows10 with already included features
Best practices to secure Windows10 with already included featuresBest practices to secure Windows10 with already included features
Best practices to secure Windows10 with already included features
 
IoT-Device-Security.pptx
IoT-Device-Security.pptxIoT-Device-Security.pptx
IoT-Device-Security.pptx
 
Security Testing for IoT Systems
Security Testing for IoT SystemsSecurity Testing for IoT Systems
Security Testing for IoT Systems
 
Best Practices For Securing Your Software Applications.pdf
Best Practices For Securing Your Software Applications.pdfBest Practices For Securing Your Software Applications.pdf
Best Practices For Securing Your Software Applications.pdf
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
 

Recently uploaded

English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
BrazilAccount1
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
Vijay Dialani, PhD
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
Runway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptxRunway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptx
SupreethSP4
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
BrazilAccount1
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
WENKENLI1
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
ViniHema
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
zwunae
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 

Recently uploaded (20)

English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
Runway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptxRunway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptx
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 

USB Physical Ports Security Using Python

  • 1. USB PHYSICAL PORTS SECURITY USING PYTHON
  • 2. AGENDA • To develop a Graphical User Interface (GUI) application for user authentication and USB port control. • The system would allow users to enter password, and upon successful validation, it would lock or unlock the USB ports. • Prevent confidential information from being copied to unauthorized removable storage devices and minimize the risk of data loss and data leaks. • Get protection against the spread of USB malware and potential data breaches with an effective USB port lock software
  • 3. PROBLEMS WITH USB • Malware infections: Unintentional infection occurs when someone inserts an unprotected USB device into a compromised system. In an intentional infection, someone knowingly infects a device in order to connect it to a system and harm sensitive data. • USB device spoofing: The USB drive contains software that tricks the computer into thinking a keyboard is attached. The drive then injects keystrokes to command the computer to install malware. • BadUSB attacks: BadUSB is a computer security attack using USB devices that are programmed with malicious software.
  • 4. PROJECT OVERVIEW • Develop a user-friendly GUI for login and password entry. • Implement a secure authentication process to verify user credentials. • Control the USB ports based on authentication status. • Enhance system security by restricting access to USB ports.
  • 5. PROJECT REQUIREMENTS • Python IDE: An Integrated Development Environment(IDE) is a program dedicated to software development. As the name implies, IDEs integrate several tools specifically designed for software development. • Python Libraries: A Python library is a collection of related modules. It contains bundles of code that can be used repeatedly in different programs. It makes Python Programming simpler and convenient for the programmer and some of the Libraries used in this are: tkinter, Subprocess, os.
  • 6. WHO ARE THE END USERS? •Enterprises and Organizations •IT Administrators •Healthcare Institutions •Financial Institutions •Educational Institutions •Government Agencies •Personal Users
  • 7. FUTURE ENHANCEMENT •Audit and Reporting: Implement an auditing feature that logs USB port activities including lock and unlock events, connected devices, and user actions. This helps organizations track and monitor USB usage, identify potential security breaches or policy violations, and generate reports for compliance purposes. •Remote Locking and Unlocking: Enable the capability to remotely lock or unlock USB ports on managed devices. This can be useful for scenarios where devices are lost, stolen •Intelligent Threat Detection: Incorporate intelligent threat detection mechanisms that analyze USB device behavior and identify potential security risks.
  • 8. CONCLUSION •The development of a GUI for USB port locking and unlocking with user validation brings several significant benefits to enhancing USB port security. •By implementing user validation as an additional layer of protection, organizations can effectively control access to USB ports and mitigate potential risks associated with unauthorized data transfer, malware introduction, and data leakage. •By creating a GUI for USB port locking and unlocking with user validation, organizations can take proactive steps to safeguard their networks, protect valuable data assets, and maintain compliance with data security regulations.