SlideShare ist ein Scribd-Unternehmen logo
1 von 29
USB Drive Security RisksUSB Drive Security Risks
Preview
• USB drive trend
• Risks of storing data in USB drive
• What we need to do
• How to do it
• Why we should do it now
• conclusion
• USB thumb drive
• USB memory stick
• USB jump drive
• First sold in year 2000
• weigh less than 2 ounces
• Intended to make life easier for users
HistoryHistory
1)Wi-Fi
2) Digital Camera
3) MP3 Player/IPOD
4) Email
5) Floppy Disks
6) CDR, CDRW, DVD-RW
7) Remote control software
Different ways to get data out.
AlternativesAlternatives
• Small physical size
• More durable
• Fast Speed --3MB/s
• Big capacity
• Low price
• More functionality
• Plug-and-Play
-1million read & write cycle
Why Choose USB ?Why Choose USB ?
Greatest benefit = Greatest security risk !Greatest benefit = Greatest security risk !
85million units sold in 2007
Only few buyers thought about the
drives’ security implications.
-Gartner
According to security firm Vontu
• >50% of 480 surveyed tech-
professionals’ USB drives contain
unprotected confidential information
• 1 USB drive is lost at work each month
– Unlike laptop, storage devices are small and
cheap. Many employees do not report them
missing as they would a laptop.
• Corruption of data
• Virus Transmissions
• Loss of media
• Loss of confidentiality
RisksRisks
• Corruption of data
– Occur if the drive is uncleanly dismounted
–computer usually has no way of knowing when
USB memory sticks are going to be removed
– The OS will attempt to handle unexpected disconnects
as best it can, so often no corruption will occur.
RisksRisks
• Corruption of data
• Virus Transmissions
Whenever files are transferred between two machines there is a risk
that viral code or some other malware will be transmitted, and USB
memory sticks are no exception.
• April 2008, a batch of HP USB flash drives were shipped with a virus.
• November 2007, Maxtor USB Hard Drives Ship Virus Infected
RisksRisks
• Corruption of data
• Virus Transmissions
• Loss of Media
– A drawback to the small size is that they are easily
misplaced, left behind, or otherwise lost.
– All data is lost too
RisksRisks
• Corruption of data
• Virus Transmissions
• Loss of Media
• Loss of Confidentiality
– If the stick then finds its way into the hands of a
competitor, then the company has suffered a much
greater loss than simply the replacement cost of the
drive.
– A $25 thumb drive can contain $25 million worth of
information on it
RisksRisks
• The personal information of 6,500 current and former
University of Kentucky students was reported stolen May 26
after the theft of a professor's flash drive. The drive has not
been recovered.
• April 2006, Flash drives holding sensitive and classified
military information turned up for sale at a bazaar near
Afghanistan. Investigators recovered many drives, but an
unknown number are still missing.
• In October, Wilcox Memorial Hospital in Hawaii, informed
120,000 current and former patients that a flash drive
containing their personal information — names, addresses,
Social Security numbers and identifying medical record
numbers — was lost. It has yet to be recovered.
Recent IncidentsRecent Incidents
4 easy steps
SolutionsSolutions
Corruption of Data
• dismount the device according to the OS
documentation.
Virus Transmission
• Some USB memory sticks include a physical
switch that can put the drive in read-only
mode.
– keep the host computer from writing or
modifying data (including viruses) on the drive
• If files need to be transferred from an un-
trusted machine, scan the USB drive after
copying files from it.
Loss of Media
• attaching flash drives to keychains, necklaces
and lanyards.
Loss of Confidentiality
• avoidance
– no private data is stored on the drive
• severely limiting
• encryption.
– allows any data to be stored
on the drive but renders the
data useless without the
required password,
Encryption
– fingerprint scanning USB drive
• run your finger over the scanner and it will be
ready to read your files.
• Very expensive
– Pre-installed encryption software
• Cost 2X more
– encryption software
• Commercial
• Free
• easy and fast
• encrypt files/folders.
• 128 bits encryption
• On-the-fly (Real Time)
• Encrypt Automatically
• encrypt virtual partition
• 256 bit AES (military-
grade) encryption
• Can’t completely eliminate all the risk
• Significantly reduce all
the risks
• Kick-back and relax
If You DoIf You Do
• It will be too late when
you lost the drive or
your drive got infected
by virus.
Recognize the thumb-drive threat and take action
If You Don’tIf You Don’t
• USB drive will become more popular and
security incidents will occur more often
• 4 steps to reduce
– Data corruption
– Virus transmissions
– Loss of media
– Loss of confidentiality
ConclusionConclusion
USB flash drive security
USB flash drive security

Weitere ähnliche Inhalte

Was ist angesagt? (20)

Data Backup (IT) Lecture Slide # 5
Data Backup (IT) Lecture Slide # 5Data Backup (IT) Lecture Slide # 5
Data Backup (IT) Lecture Slide # 5
 
VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing
 
Application Security
Application SecurityApplication Security
Application Security
 
Basics of Denial of Service Attacks
Basics of Denial of Service AttacksBasics of Denial of Service Attacks
Basics of Denial of Service Attacks
 
The Rise of Ransomware
The Rise of RansomwareThe Rise of Ransomware
The Rise of Ransomware
 
Vapt life cycle
Vapt life cycleVapt life cycle
Vapt life cycle
 
Security testing
Security testingSecurity testing
Security testing
 
Android Hacking + Pentesting
Android Hacking + Pentesting Android Hacking + Pentesting
Android Hacking + Pentesting
 
Password craking techniques
Password craking techniques Password craking techniques
Password craking techniques
 
Ch 11: Hacking Wireless Networks
Ch 11: Hacking Wireless NetworksCh 11: Hacking Wireless Networks
Ch 11: Hacking Wireless Networks
 
Windowsforensics
WindowsforensicsWindowsforensics
Windowsforensics
 
Application Security - Your Success Depends on it
Application Security - Your Success Depends on itApplication Security - Your Success Depends on it
Application Security - Your Success Depends on it
 
Android Hacking
Android HackingAndroid Hacking
Android Hacking
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Windows Forensic 101
Windows Forensic 101Windows Forensic 101
Windows Forensic 101
 
zero day exploits
zero day exploitszero day exploits
zero day exploits
 
Malware
MalwareMalware
Malware
 
Password Cracking
Password Cracking Password Cracking
Password Cracking
 
Malware forensics
Malware forensicsMalware forensics
Malware forensics
 
Computer Worms
Computer WormsComputer Worms
Computer Worms
 

Andere mochten auch (14)

Pendrive
PendrivePendrive
Pendrive
 
USB Powerpoint
USB PowerpointUSB Powerpoint
USB Powerpoint
 
Pendrive
PendrivePendrive
Pendrive
 
wireless usb ppt
wireless usb pptwireless usb ppt
wireless usb ppt
 
Pendrive
PendrivePendrive
Pendrive
 
Usb universal serial bus
Usb   universal serial busUsb   universal serial bus
Usb universal serial bus
 
Pendrives (USB)
Pendrives (USB)Pendrives (USB)
Pendrives (USB)
 
Wireless usb chetan_20_oct
Wireless usb chetan_20_octWireless usb chetan_20_oct
Wireless usb chetan_20_oct
 
I Want These * Bugs Off My * Internet
I Want These * Bugs Off My * InternetI Want These * Bugs Off My * Internet
I Want These * Bugs Off My * Internet
 
Wireless usb
Wireless usbWireless usb
Wireless usb
 
Pen drive
Pen drivePen drive
Pen drive
 
Spyware
SpywareSpyware
Spyware
 
Wireless usb ppt
Wireless usb pptWireless usb ppt
Wireless usb ppt
 
Access Control Presentation
Access Control PresentationAccess Control Presentation
Access Control Presentation
 

Ähnlich wie USB flash drive security

PORTABLE STORAGE SOLUTIONS - HARD DRIVES AND FLASH DRIVES BY DR SHASHWAT JANI
PORTABLE STORAGE SOLUTIONS - HARD DRIVES AND FLASH DRIVES BY DR SHASHWAT JANIPORTABLE STORAGE SOLUTIONS - HARD DRIVES AND FLASH DRIVES BY DR SHASHWAT JANI
PORTABLE STORAGE SOLUTIONS - HARD DRIVES AND FLASH DRIVES BY DR SHASHWAT JANIDR SHASHWAT JANI
 
Watching the Detectives: Using digital forensics techniques to investigate th...
Watching the Detectives: Using digital forensics techniques to investigate th...Watching the Detectives: Using digital forensics techniques to investigate th...
Watching the Detectives: Using digital forensics techniques to investigate th...GarethKnight
 
Brev loc cloud data storage, backup and recovery pres
Brev loc cloud data storage, backup and recovery presBrev loc cloud data storage, backup and recovery pres
Brev loc cloud data storage, backup and recovery presdanmraz
 
Brev loc cloud data storage, backup and recovery pres
Brev loc cloud data storage, backup and recovery presBrev loc cloud data storage, backup and recovery pres
Brev loc cloud data storage, backup and recovery presdanmraz
 
Secondary storage devices
Secondary storage devicesSecondary storage devices
Secondary storage devicesAbhinav Kp
 
University of Bath Research Data Management training for researchers
University of Bath Research Data Management training for researchersUniversity of Bath Research Data Management training for researchers
University of Bath Research Data Management training for researchersJez Cope
 
101 ways to use a flash drive
101 ways to use a flash drive101 ways to use a flash drive
101 ways to use a flash driveJoel May
 
CYBERdisk WORMdisk SLIDES 2016-HACK PROOF DATA
CYBERdisk  WORMdisk SLIDES  2016-HACK PROOF DATACYBERdisk  WORMdisk SLIDES  2016-HACK PROOF DATA
CYBERdisk WORMdisk SLIDES 2016-HACK PROOF DATAKeith P. Melvey
 
File storageandbackupsystems
File storageandbackupsystemsFile storageandbackupsystems
File storageandbackupsystemsMicheline LeBlanc
 
Anti Whaling Hardening Up Your Net Presence
Anti   Whaling   Hardening Up Your Net PresenceAnti   Whaling   Hardening Up Your Net Presence
Anti Whaling Hardening Up Your Net PresenceEngineers Australia
 
Anti Whaling Hardening Up Your Net Presence
Anti   Whaling   Hardening Up Your Net PresenceAnti   Whaling   Hardening Up Your Net Presence
Anti Whaling Hardening Up Your Net Presencegueste0b5fe
 
iGCSE Theory Unit 3 - backing up data
iGCSE Theory Unit 3 - backing up dataiGCSE Theory Unit 3 - backing up data
iGCSE Theory Unit 3 - backing up datajonspav
 
Lect 07 computer security and privacy 1 4 q
Lect 07 computer security and privacy 1 4 qLect 07 computer security and privacy 1 4 q
Lect 07 computer security and privacy 1 4 qRamy Eltarras
 
liferay-safe-slides.pdf
liferay-safe-slides.pdfliferay-safe-slides.pdf
liferay-safe-slides.pdfSalini P
 

Ähnlich wie USB flash drive security (20)

Clape n
Clape nClape n
Clape n
 
PORTABLE STORAGE SOLUTIONS - HARD DRIVES AND FLASH DRIVES BY DR SHASHWAT JANI
PORTABLE STORAGE SOLUTIONS - HARD DRIVES AND FLASH DRIVES BY DR SHASHWAT JANIPORTABLE STORAGE SOLUTIONS - HARD DRIVES AND FLASH DRIVES BY DR SHASHWAT JANI
PORTABLE STORAGE SOLUTIONS - HARD DRIVES AND FLASH DRIVES BY DR SHASHWAT JANI
 
Ca presentation
Ca presentationCa presentation
Ca presentation
 
Watching the Detectives: Using digital forensics techniques to investigate th...
Watching the Detectives: Using digital forensics techniques to investigate th...Watching the Detectives: Using digital forensics techniques to investigate th...
Watching the Detectives: Using digital forensics techniques to investigate th...
 
Brev loc cloud data storage, backup and recovery pres
Brev loc cloud data storage, backup and recovery presBrev loc cloud data storage, backup and recovery pres
Brev loc cloud data storage, backup and recovery pres
 
Brev loc cloud data storage, backup and recovery pres
Brev loc cloud data storage, backup and recovery presBrev loc cloud data storage, backup and recovery pres
Brev loc cloud data storage, backup and recovery pres
 
Secondary storage devices
Secondary storage devicesSecondary storage devices
Secondary storage devices
 
University of Bath Research Data Management training for researchers
University of Bath Research Data Management training for researchersUniversity of Bath Research Data Management training for researchers
University of Bath Research Data Management training for researchers
 
Data security
Data securityData security
Data security
 
S tora ge devices
S tora ge devicesS tora ge devices
S tora ge devices
 
101 ways to use a flash drive
101 ways to use a flash drive101 ways to use a flash drive
101 ways to use a flash drive
 
CYBERdisk WORMdisk SLIDES 2016-HACK PROOF DATA
CYBERdisk  WORMdisk SLIDES  2016-HACK PROOF DATACYBERdisk  WORMdisk SLIDES  2016-HACK PROOF DATA
CYBERdisk WORMdisk SLIDES 2016-HACK PROOF DATA
 
File storageandbackupsystems
File storageandbackupsystemsFile storageandbackupsystems
File storageandbackupsystems
 
Anti Whaling Hardening Up Your Net Presence
Anti   Whaling   Hardening Up Your Net PresenceAnti   Whaling   Hardening Up Your Net Presence
Anti Whaling Hardening Up Your Net Presence
 
Anti Whaling Hardening Up Your Net Presence
Anti   Whaling   Hardening Up Your Net PresenceAnti   Whaling   Hardening Up Your Net Presence
Anti Whaling Hardening Up Your Net Presence
 
iGCSE Theory Unit 3 - backing up data
iGCSE Theory Unit 3 - backing up dataiGCSE Theory Unit 3 - backing up data
iGCSE Theory Unit 3 - backing up data
 
Encryption
EncryptionEncryption
Encryption
 
Lect 07 computer security and privacy 1 4 q
Lect 07 computer security and privacy 1 4 qLect 07 computer security and privacy 1 4 q
Lect 07 computer security and privacy 1 4 q
 
liferay-safe-slides.pdf
liferay-safe-slides.pdfliferay-safe-slides.pdf
liferay-safe-slides.pdf
 
Media Storage
Media StorageMedia Storage
Media Storage
 

Kürzlich hochgeladen

Independent Lucknow Call Girls 8923113531WhatsApp Lucknow Call Girls make you...
Independent Lucknow Call Girls 8923113531WhatsApp Lucknow Call Girls make you...Independent Lucknow Call Girls 8923113531WhatsApp Lucknow Call Girls make you...
Independent Lucknow Call Girls 8923113531WhatsApp Lucknow Call Girls make you...makika9823
 
Malad Call Girl in Services 9892124323 | ₹,4500 With Room Free Delivery
Malad Call Girl in Services  9892124323 | ₹,4500 With Room Free DeliveryMalad Call Girl in Services  9892124323 | ₹,4500 With Room Free Delivery
Malad Call Girl in Services 9892124323 | ₹,4500 With Room Free DeliveryPooja Nehwal
 
Instant Issue Debit Cards - High School Spirit
Instant Issue Debit Cards - High School SpiritInstant Issue Debit Cards - High School Spirit
Instant Issue Debit Cards - High School Spiritegoetzinger
 
Instant Issue Debit Cards - School Designs
Instant Issue Debit Cards - School DesignsInstant Issue Debit Cards - School Designs
Instant Issue Debit Cards - School Designsegoetzinger
 
The Economic History of the U.S. Lecture 30.pdf
The Economic History of the U.S. Lecture 30.pdfThe Economic History of the U.S. Lecture 30.pdf
The Economic History of the U.S. Lecture 30.pdfGale Pooley
 
Bladex Earnings Call Presentation 1Q2024
Bladex Earnings Call Presentation 1Q2024Bladex Earnings Call Presentation 1Q2024
Bladex Earnings Call Presentation 1Q2024Bladex
 
VIP Kolkata Call Girl Jodhpur Park 👉 8250192130 Available With Room
VIP Kolkata Call Girl Jodhpur Park 👉 8250192130  Available With RoomVIP Kolkata Call Girl Jodhpur Park 👉 8250192130  Available With Room
VIP Kolkata Call Girl Jodhpur Park 👉 8250192130 Available With Roomdivyansh0kumar0
 
OAT_RI_Ep19 WeighingTheRisks_Apr24_TheYellowMetal.pptx
OAT_RI_Ep19 WeighingTheRisks_Apr24_TheYellowMetal.pptxOAT_RI_Ep19 WeighingTheRisks_Apr24_TheYellowMetal.pptx
OAT_RI_Ep19 WeighingTheRisks_Apr24_TheYellowMetal.pptxhiddenlevers
 
00_Main ppt_MeetupDORA&CyberSecurity.pptx
00_Main ppt_MeetupDORA&CyberSecurity.pptx00_Main ppt_MeetupDORA&CyberSecurity.pptx
00_Main ppt_MeetupDORA&CyberSecurity.pptxFinTech Belgium
 
03_Emmanuel Ndiaye_Degroof Petercam.pptx
03_Emmanuel Ndiaye_Degroof Petercam.pptx03_Emmanuel Ndiaye_Degroof Petercam.pptx
03_Emmanuel Ndiaye_Degroof Petercam.pptxFinTech Belgium
 
The Economic History of the U.S. Lecture 20.pdf
The Economic History of the U.S. Lecture 20.pdfThe Economic History of the U.S. Lecture 20.pdf
The Economic History of the U.S. Lecture 20.pdfGale Pooley
 
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130Suhani Kapoor
 
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptxFinTech Belgium
 
TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...
TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...
TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...ssifa0344
 
20240417-Calibre-April-2024-Investor-Presentation.pdf
20240417-Calibre-April-2024-Investor-Presentation.pdf20240417-Calibre-April-2024-Investor-Presentation.pdf
20240417-Calibre-April-2024-Investor-Presentation.pdfAdnet Communications
 
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdfFinTech Belgium
 
Quarter 4- Module 3 Principles of Marketing
Quarter 4- Module 3 Principles of MarketingQuarter 4- Module 3 Principles of Marketing
Quarter 4- Module 3 Principles of MarketingMaristelaRamos12
 
High Class Call Girls Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
High Class Call Girls Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsHigh Class Call Girls Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
High Class Call Girls Nagpur Grishma Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...
Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...
Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...ssifa0344
 
Monthly Market Risk Update: April 2024 [SlideShare]
Monthly Market Risk Update: April 2024 [SlideShare]Monthly Market Risk Update: April 2024 [SlideShare]
Monthly Market Risk Update: April 2024 [SlideShare]Commonwealth
 

Kürzlich hochgeladen (20)

Independent Lucknow Call Girls 8923113531WhatsApp Lucknow Call Girls make you...
Independent Lucknow Call Girls 8923113531WhatsApp Lucknow Call Girls make you...Independent Lucknow Call Girls 8923113531WhatsApp Lucknow Call Girls make you...
Independent Lucknow Call Girls 8923113531WhatsApp Lucknow Call Girls make you...
 
Malad Call Girl in Services 9892124323 | ₹,4500 With Room Free Delivery
Malad Call Girl in Services  9892124323 | ₹,4500 With Room Free DeliveryMalad Call Girl in Services  9892124323 | ₹,4500 With Room Free Delivery
Malad Call Girl in Services 9892124323 | ₹,4500 With Room Free Delivery
 
Instant Issue Debit Cards - High School Spirit
Instant Issue Debit Cards - High School SpiritInstant Issue Debit Cards - High School Spirit
Instant Issue Debit Cards - High School Spirit
 
Instant Issue Debit Cards - School Designs
Instant Issue Debit Cards - School DesignsInstant Issue Debit Cards - School Designs
Instant Issue Debit Cards - School Designs
 
The Economic History of the U.S. Lecture 30.pdf
The Economic History of the U.S. Lecture 30.pdfThe Economic History of the U.S. Lecture 30.pdf
The Economic History of the U.S. Lecture 30.pdf
 
Bladex Earnings Call Presentation 1Q2024
Bladex Earnings Call Presentation 1Q2024Bladex Earnings Call Presentation 1Q2024
Bladex Earnings Call Presentation 1Q2024
 
VIP Kolkata Call Girl Jodhpur Park 👉 8250192130 Available With Room
VIP Kolkata Call Girl Jodhpur Park 👉 8250192130  Available With RoomVIP Kolkata Call Girl Jodhpur Park 👉 8250192130  Available With Room
VIP Kolkata Call Girl Jodhpur Park 👉 8250192130 Available With Room
 
OAT_RI_Ep19 WeighingTheRisks_Apr24_TheYellowMetal.pptx
OAT_RI_Ep19 WeighingTheRisks_Apr24_TheYellowMetal.pptxOAT_RI_Ep19 WeighingTheRisks_Apr24_TheYellowMetal.pptx
OAT_RI_Ep19 WeighingTheRisks_Apr24_TheYellowMetal.pptx
 
00_Main ppt_MeetupDORA&CyberSecurity.pptx
00_Main ppt_MeetupDORA&CyberSecurity.pptx00_Main ppt_MeetupDORA&CyberSecurity.pptx
00_Main ppt_MeetupDORA&CyberSecurity.pptx
 
03_Emmanuel Ndiaye_Degroof Petercam.pptx
03_Emmanuel Ndiaye_Degroof Petercam.pptx03_Emmanuel Ndiaye_Degroof Petercam.pptx
03_Emmanuel Ndiaye_Degroof Petercam.pptx
 
The Economic History of the U.S. Lecture 20.pdf
The Economic History of the U.S. Lecture 20.pdfThe Economic History of the U.S. Lecture 20.pdf
The Economic History of the U.S. Lecture 20.pdf
 
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130
 
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
 
TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...
TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...
TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...
 
20240417-Calibre-April-2024-Investor-Presentation.pdf
20240417-Calibre-April-2024-Investor-Presentation.pdf20240417-Calibre-April-2024-Investor-Presentation.pdf
20240417-Calibre-April-2024-Investor-Presentation.pdf
 
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
 
Quarter 4- Module 3 Principles of Marketing
Quarter 4- Module 3 Principles of MarketingQuarter 4- Module 3 Principles of Marketing
Quarter 4- Module 3 Principles of Marketing
 
High Class Call Girls Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
High Class Call Girls Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsHigh Class Call Girls Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
High Class Call Girls Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
 
Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...
Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...
Solution Manual for Principles of Corporate Finance 14th Edition by Richard B...
 
Monthly Market Risk Update: April 2024 [SlideShare]
Monthly Market Risk Update: April 2024 [SlideShare]Monthly Market Risk Update: April 2024 [SlideShare]
Monthly Market Risk Update: April 2024 [SlideShare]
 

USB flash drive security

  • 1.
  • 2. USB Drive Security RisksUSB Drive Security Risks
  • 3. Preview • USB drive trend • Risks of storing data in USB drive • What we need to do • How to do it • Why we should do it now • conclusion
  • 4. • USB thumb drive • USB memory stick • USB jump drive • First sold in year 2000 • weigh less than 2 ounces • Intended to make life easier for users HistoryHistory
  • 5. 1)Wi-Fi 2) Digital Camera 3) MP3 Player/IPOD 4) Email 5) Floppy Disks 6) CDR, CDRW, DVD-RW 7) Remote control software Different ways to get data out. AlternativesAlternatives
  • 6. • Small physical size • More durable • Fast Speed --3MB/s • Big capacity • Low price • More functionality • Plug-and-Play -1million read & write cycle Why Choose USB ?Why Choose USB ?
  • 7. Greatest benefit = Greatest security risk !Greatest benefit = Greatest security risk !
  • 8. 85million units sold in 2007 Only few buyers thought about the drives’ security implications. -Gartner
  • 9. According to security firm Vontu • >50% of 480 surveyed tech- professionals’ USB drives contain unprotected confidential information • 1 USB drive is lost at work each month – Unlike laptop, storage devices are small and cheap. Many employees do not report them missing as they would a laptop.
  • 10.
  • 11. • Corruption of data • Virus Transmissions • Loss of media • Loss of confidentiality RisksRisks
  • 12. • Corruption of data – Occur if the drive is uncleanly dismounted –computer usually has no way of knowing when USB memory sticks are going to be removed – The OS will attempt to handle unexpected disconnects as best it can, so often no corruption will occur. RisksRisks
  • 13. • Corruption of data • Virus Transmissions Whenever files are transferred between two machines there is a risk that viral code or some other malware will be transmitted, and USB memory sticks are no exception. • April 2008, a batch of HP USB flash drives were shipped with a virus. • November 2007, Maxtor USB Hard Drives Ship Virus Infected RisksRisks
  • 14. • Corruption of data • Virus Transmissions • Loss of Media – A drawback to the small size is that they are easily misplaced, left behind, or otherwise lost. – All data is lost too RisksRisks
  • 15. • Corruption of data • Virus Transmissions • Loss of Media • Loss of Confidentiality – If the stick then finds its way into the hands of a competitor, then the company has suffered a much greater loss than simply the replacement cost of the drive. – A $25 thumb drive can contain $25 million worth of information on it RisksRisks
  • 16. • The personal information of 6,500 current and former University of Kentucky students was reported stolen May 26 after the theft of a professor's flash drive. The drive has not been recovered. • April 2006, Flash drives holding sensitive and classified military information turned up for sale at a bazaar near Afghanistan. Investigators recovered many drives, but an unknown number are still missing. • In October, Wilcox Memorial Hospital in Hawaii, informed 120,000 current and former patients that a flash drive containing their personal information — names, addresses, Social Security numbers and identifying medical record numbers — was lost. It has yet to be recovered. Recent IncidentsRecent Incidents
  • 18. Corruption of Data • dismount the device according to the OS documentation.
  • 19. Virus Transmission • Some USB memory sticks include a physical switch that can put the drive in read-only mode. – keep the host computer from writing or modifying data (including viruses) on the drive • If files need to be transferred from an un- trusted machine, scan the USB drive after copying files from it.
  • 20. Loss of Media • attaching flash drives to keychains, necklaces and lanyards.
  • 21. Loss of Confidentiality • avoidance – no private data is stored on the drive • severely limiting • encryption. – allows any data to be stored on the drive but renders the data useless without the required password,
  • 22. Encryption – fingerprint scanning USB drive • run your finger over the scanner and it will be ready to read your files. • Very expensive – Pre-installed encryption software • Cost 2X more – encryption software • Commercial • Free
  • 23. • easy and fast • encrypt files/folders. • 128 bits encryption
  • 24. • On-the-fly (Real Time) • Encrypt Automatically • encrypt virtual partition • 256 bit AES (military- grade) encryption
  • 25. • Can’t completely eliminate all the risk
  • 26. • Significantly reduce all the risks • Kick-back and relax If You DoIf You Do • It will be too late when you lost the drive or your drive got infected by virus. Recognize the thumb-drive threat and take action If You Don’tIf You Don’t
  • 27. • USB drive will become more popular and security incidents will occur more often • 4 steps to reduce – Data corruption – Virus transmissions – Loss of media – Loss of confidentiality ConclusionConclusion

Hinweis der Redaktion

  1. USB memory sticks differ from other types of removable media, such as CD and DVD-ROMs because the . Users of USB memory sticks usually need to alert the computer that they intend to remove the device, otherwise the computer will be unable to perform the necessary clean-up functions required to disconnect the device,