SlideShare uma empresa Scribd logo
1 de 29
USB Drive Security RisksUSB Drive Security Risks
Preview
• USB drive trend
• Risks of storing data in USB drive
• What we need to do
• How to do it
• Why we should do it now
• conclusion
• USB thumb drive
• USB memory stick
• USB jump drive
• First sold in year 2000
• weigh less than 2 ounces
• Intended to make life easier for users
HistoryHistory
1)Wi-Fi
2) Digital Camera
3) MP3 Player/IPOD
4) Email
5) Floppy Disks
6) CDR, CDRW, DVD-RW
7) Remote control software
Different ways to get data out.
AlternativesAlternatives
• Small physical size
• More durable
• Fast Speed --3MB/s
• Big capacity
• Low price
• More functionality
• Plug-and-Play
-1million read & write cycle
Why Choose USB ?Why Choose USB ?
Greatest benefit = Greatest security risk !Greatest benefit = Greatest security risk !
85million units sold in 2007
Only few buyers thought about the
drives’ security implications.
-Gartner
According to security firm Vontu
• >50% of 480 surveyed tech-
professionals’ USB drives contain
unprotected confidential information
• 1 USB drive is lost at work each month
– Unlike laptop, storage devices are small and
cheap. Many employees do not report them
missing as they would a laptop.
• Corruption of data
• Virus Transmissions
• Loss of media
• Loss of confidentiality
RisksRisks
• Corruption of data
– Occur if the drive is uncleanly dismounted
–computer usually has no way of knowing when
USB memory sticks are going to be removed
– The OS will attempt to handle unexpected disconnects
as best it can, so often no corruption will occur.
RisksRisks
• Corruption of data
• Virus Transmissions
Whenever files are transferred between two machines there is a risk
that viral code or some other malware will be transmitted, and USB
memory sticks are no exception.
• April 2008, a batch of HP USB flash drives were shipped with a virus.
• November 2007, Maxtor USB Hard Drives Ship Virus Infected
RisksRisks
• Corruption of data
• Virus Transmissions
• Loss of Media
– A drawback to the small size is that they are easily
misplaced, left behind, or otherwise lost.
– All data is lost too
RisksRisks
• Corruption of data
• Virus Transmissions
• Loss of Media
• Loss of Confidentiality
– If the stick then finds its way into the hands of a
competitor, then the company has suffered a much
greater loss than simply the replacement cost of the
drive.
– A $25 thumb drive can contain $25 million worth of
information on it
RisksRisks
• The personal information of 6,500 current and former
University of Kentucky students was reported stolen May 26
after the theft of a professor's flash drive. The drive has not
been recovered.
• April 2006, Flash drives holding sensitive and classified
military information turned up for sale at a bazaar near
Afghanistan. Investigators recovered many drives, but an
unknown number are still missing.
• In October, Wilcox Memorial Hospital in Hawaii, informed
120,000 current and former patients that a flash drive
containing their personal information — names, addresses,
Social Security numbers and identifying medical record
numbers — was lost. It has yet to be recovered.
Recent IncidentsRecent Incidents
4 easy steps
SolutionsSolutions
Corruption of Data
• dismount the device according to the OS
documentation.
Virus Transmission
• Some USB memory sticks include a physical
switch that can put the drive in read-only
mode.
– keep the host computer from writing or
modifying data (including viruses) on the drive
• If files need to be transferred from an un-
trusted machine, scan the USB drive after
copying files from it.
Loss of Media
• attaching flash drives to keychains, necklaces
and lanyards.
Loss of Confidentiality
• avoidance
– no private data is stored on the drive
• severely limiting
• encryption.
– allows any data to be stored
on the drive but renders the
data useless without the
required password,
Encryption
– fingerprint scanning USB drive
• run your finger over the scanner and it will be
ready to read your files.
• Very expensive
– Pre-installed encryption software
• Cost 2X more
– encryption software
• Commercial
• Free
• easy and fast
• encrypt files/folders.
• 128 bits encryption
• On-the-fly (Real Time)
• Encrypt Automatically
• encrypt virtual partition
• 256 bit AES (military-
grade) encryption
• Can’t completely eliminate all the risk
• Significantly reduce all
the risks
• Kick-back and relax
If You DoIf You Do
• It will be too late when
you lost the drive or
your drive got infected
by virus.
Recognize the thumb-drive threat and take action
If You Don’tIf You Don’t
• USB drive will become more popular and
security incidents will occur more often
• 4 steps to reduce
– Data corruption
– Virus transmissions
– Loss of media
– Loss of confidentiality
ConclusionConclusion
USB flash drive security
USB flash drive security

Mais conteúdo relacionado

Mais procurados

Information Leakage & DLP
Information Leakage & DLPInformation Leakage & DLP
Information Leakage & DLP
Yun Lu
 
Seminar-Two Factor Authentication
Seminar-Two Factor AuthenticationSeminar-Two Factor Authentication
Seminar-Two Factor Authentication
Dilip Kr. Jangir
 

Mais procurados (20)

Cia security model
Cia security modelCia security model
Cia security model
 
Security awareness
Security awarenessSecurity awareness
Security awareness
 
Ransomware
RansomwareRansomware
Ransomware
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Information Security : Is it an Art or a Science
Information Security : Is it an Art or a ScienceInformation Security : Is it an Art or a Science
Information Security : Is it an Art or a Science
 
End-User Security Awareness
End-User Security AwarenessEnd-User Security Awareness
End-User Security Awareness
 
Two Factor Authentication: Easy Setup, Major Impact
Two Factor Authentication: Easy Setup, Major ImpactTwo Factor Authentication: Easy Setup, Major Impact
Two Factor Authentication: Easy Setup, Major Impact
 
Cyber security
Cyber securityCyber security
Cyber security
 
Network Forensics: Packet Analysis Using Wireshark
Network Forensics: Packet Analysis Using WiresharkNetwork Forensics: Packet Analysis Using Wireshark
Network Forensics: Packet Analysis Using Wireshark
 
Information Leakage & DLP
Information Leakage & DLPInformation Leakage & DLP
Information Leakage & DLP
 
Security threats in social networks
Security threats in social networksSecurity threats in social networks
Security threats in social networks
 
Mobile Hacking
Mobile HackingMobile Hacking
Mobile Hacking
 
Multifactor Authentication
Multifactor AuthenticationMultifactor Authentication
Multifactor Authentication
 
Security Awareness Training by Fortinet
Security Awareness Training by FortinetSecurity Awareness Training by Fortinet
Security Awareness Training by Fortinet
 
Network Security
Network SecurityNetwork Security
Network Security
 
Firewall
Firewall Firewall
Firewall
 
Seminar-Two Factor Authentication
Seminar-Two Factor AuthenticationSeminar-Two Factor Authentication
Seminar-Two Factor Authentication
 
Android Device Hardening
Android Device HardeningAndroid Device Hardening
Android Device Hardening
 
Awareness Training on Information Security
Awareness Training on Information SecurityAwareness Training on Information Security
Awareness Training on Information Security
 

Destaque (14)

Pendrive
PendrivePendrive
Pendrive
 
USB Powerpoint
USB PowerpointUSB Powerpoint
USB Powerpoint
 
Pendrive
PendrivePendrive
Pendrive
 
wireless usb ppt
wireless usb pptwireless usb ppt
wireless usb ppt
 
Pendrive
PendrivePendrive
Pendrive
 
Usb universal serial bus
Usb   universal serial busUsb   universal serial bus
Usb universal serial bus
 
Pendrives (USB)
Pendrives (USB)Pendrives (USB)
Pendrives (USB)
 
Wireless usb chetan_20_oct
Wireless usb chetan_20_octWireless usb chetan_20_oct
Wireless usb chetan_20_oct
 
I Want These * Bugs Off My * Internet
I Want These * Bugs Off My * InternetI Want These * Bugs Off My * Internet
I Want These * Bugs Off My * Internet
 
Wireless usb
Wireless usbWireless usb
Wireless usb
 
Pen drive
Pen drivePen drive
Pen drive
 
Spyware
SpywareSpyware
Spyware
 
Wireless usb ppt
Wireless usb pptWireless usb ppt
Wireless usb ppt
 
Access Control Presentation
Access Control PresentationAccess Control Presentation
Access Control Presentation
 

Semelhante a USB flash drive security

Brev loc cloud data storage, backup and recovery pres
Brev loc cloud data storage, backup and recovery presBrev loc cloud data storage, backup and recovery pres
Brev loc cloud data storage, backup and recovery pres
danmraz
 
Brev loc cloud data storage, backup and recovery pres
Brev loc cloud data storage, backup and recovery presBrev loc cloud data storage, backup and recovery pres
Brev loc cloud data storage, backup and recovery pres
danmraz
 
101 ways to use a flash drive
101 ways to use a flash drive101 ways to use a flash drive
101 ways to use a flash drive
Joel May
 
CYBERdisk WORMdisk SLIDES 2016-HACK PROOF DATA
CYBERdisk  WORMdisk SLIDES  2016-HACK PROOF DATACYBERdisk  WORMdisk SLIDES  2016-HACK PROOF DATA
CYBERdisk WORMdisk SLIDES 2016-HACK PROOF DATA
Keith P. Melvey
 
File storageandbackupsystems
File storageandbackupsystemsFile storageandbackupsystems
File storageandbackupsystems
Micheline LeBlanc
 
Anti Whaling Hardening Up Your Net Presence
Anti   Whaling   Hardening Up Your Net PresenceAnti   Whaling   Hardening Up Your Net Presence
Anti Whaling Hardening Up Your Net Presence
Engineers Australia
 
Anti Whaling Hardening Up Your Net Presence
Anti   Whaling   Hardening Up Your Net PresenceAnti   Whaling   Hardening Up Your Net Presence
Anti Whaling Hardening Up Your Net Presence
gueste0b5fe
 
Lect 07 computer security and privacy 1 4 q
Lect 07 computer security and privacy 1 4 qLect 07 computer security and privacy 1 4 q
Lect 07 computer security and privacy 1 4 q
Ramy Eltarras
 

Semelhante a USB flash drive security (20)

Clape n
Clape nClape n
Clape n
 
PORTABLE STORAGE SOLUTIONS - HARD DRIVES AND FLASH DRIVES BY DR SHASHWAT JANI
PORTABLE STORAGE SOLUTIONS - HARD DRIVES AND FLASH DRIVES BY DR SHASHWAT JANIPORTABLE STORAGE SOLUTIONS - HARD DRIVES AND FLASH DRIVES BY DR SHASHWAT JANI
PORTABLE STORAGE SOLUTIONS - HARD DRIVES AND FLASH DRIVES BY DR SHASHWAT JANI
 
Ca presentation
Ca presentationCa presentation
Ca presentation
 
Watching the Detectives: Using digital forensics techniques to investigate th...
Watching the Detectives: Using digital forensics techniques to investigate th...Watching the Detectives: Using digital forensics techniques to investigate th...
Watching the Detectives: Using digital forensics techniques to investigate th...
 
Brev loc cloud data storage, backup and recovery pres
Brev loc cloud data storage, backup and recovery presBrev loc cloud data storage, backup and recovery pres
Brev loc cloud data storage, backup and recovery pres
 
Brev loc cloud data storage, backup and recovery pres
Brev loc cloud data storage, backup and recovery presBrev loc cloud data storage, backup and recovery pres
Brev loc cloud data storage, backup and recovery pres
 
Secondary storage devices
Secondary storage devicesSecondary storage devices
Secondary storage devices
 
University of Bath Research Data Management training for researchers
University of Bath Research Data Management training for researchersUniversity of Bath Research Data Management training for researchers
University of Bath Research Data Management training for researchers
 
Data security
Data securityData security
Data security
 
S tora ge devices
S tora ge devicesS tora ge devices
S tora ge devices
 
101 ways to use a flash drive
101 ways to use a flash drive101 ways to use a flash drive
101 ways to use a flash drive
 
CYBERdisk WORMdisk SLIDES 2016-HACK PROOF DATA
CYBERdisk  WORMdisk SLIDES  2016-HACK PROOF DATACYBERdisk  WORMdisk SLIDES  2016-HACK PROOF DATA
CYBERdisk WORMdisk SLIDES 2016-HACK PROOF DATA
 
File storageandbackupsystems
File storageandbackupsystemsFile storageandbackupsystems
File storageandbackupsystems
 
Anti Whaling Hardening Up Your Net Presence
Anti   Whaling   Hardening Up Your Net PresenceAnti   Whaling   Hardening Up Your Net Presence
Anti Whaling Hardening Up Your Net Presence
 
Anti Whaling Hardening Up Your Net Presence
Anti   Whaling   Hardening Up Your Net PresenceAnti   Whaling   Hardening Up Your Net Presence
Anti Whaling Hardening Up Your Net Presence
 
iGCSE Theory Unit 3 - backing up data
iGCSE Theory Unit 3 - backing up dataiGCSE Theory Unit 3 - backing up data
iGCSE Theory Unit 3 - backing up data
 
Encryption
EncryptionEncryption
Encryption
 
Lect 07 computer security and privacy 1 4 q
Lect 07 computer security and privacy 1 4 qLect 07 computer security and privacy 1 4 q
Lect 07 computer security and privacy 1 4 q
 
liferay-safe-slides.pdf
liferay-safe-slides.pdfliferay-safe-slides.pdf
liferay-safe-slides.pdf
 
Media Storage
Media StorageMedia Storage
Media Storage
 

Último

VIP Independent Call Girls in Andheri 🌹 9920725232 ( Call Me ) Mumbai Escorts...
VIP Independent Call Girls in Andheri 🌹 9920725232 ( Call Me ) Mumbai Escorts...VIP Independent Call Girls in Andheri 🌹 9920725232 ( Call Me ) Mumbai Escorts...
VIP Independent Call Girls in Andheri 🌹 9920725232 ( Call Me ) Mumbai Escorts...
dipikadinghjn ( Why You Choose Us? ) Escorts
 
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best sexual service
anilsa9823
 
VIP Call Girl Service Andheri West ⚡ 9920725232 What It Takes To Be The Best ...
VIP Call Girl Service Andheri West ⚡ 9920725232 What It Takes To Be The Best ...VIP Call Girl Service Andheri West ⚡ 9920725232 What It Takes To Be The Best ...
VIP Call Girl Service Andheri West ⚡ 9920725232 What It Takes To Be The Best ...
dipikadinghjn ( Why You Choose Us? ) Escorts
 

Último (20)

The Economic History of the U.S. Lecture 26.pdf
The Economic History of the U.S. Lecture 26.pdfThe Economic History of the U.S. Lecture 26.pdf
The Economic History of the U.S. Lecture 26.pdf
 
(DIYA) Bhumkar Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(DIYA) Bhumkar Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(DIYA) Bhumkar Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(DIYA) Bhumkar Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
VIP Independent Call Girls in Andheri 🌹 9920725232 ( Call Me ) Mumbai Escorts...
VIP Independent Call Girls in Andheri 🌹 9920725232 ( Call Me ) Mumbai Escorts...VIP Independent Call Girls in Andheri 🌹 9920725232 ( Call Me ) Mumbai Escorts...
VIP Independent Call Girls in Andheri 🌹 9920725232 ( Call Me ) Mumbai Escorts...
 
The Economic History of the U.S. Lecture 22.pdf
The Economic History of the U.S. Lecture 22.pdfThe Economic History of the U.S. Lecture 22.pdf
The Economic History of the U.S. Lecture 22.pdf
 
(ANIKA) Budhwar Peth Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANIKA) Budhwar Peth Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANIKA) Budhwar Peth Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANIKA) Budhwar Peth Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Log your LOA pain with Pension Lab's brilliant campaign
Log your LOA pain with Pension Lab's brilliant campaignLog your LOA pain with Pension Lab's brilliant campaign
Log your LOA pain with Pension Lab's brilliant campaign
 
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best sexual service
 
The Economic History of the U.S. Lecture 20.pdf
The Economic History of the U.S. Lecture 20.pdfThe Economic History of the U.S. Lecture 20.pdf
The Economic History of the U.S. Lecture 20.pdf
 
Call US 📞 9892124323 ✅ Kurla Call Girls In Kurla ( Mumbai ) secure service
Call US 📞 9892124323 ✅ Kurla Call Girls In Kurla ( Mumbai ) secure serviceCall US 📞 9892124323 ✅ Kurla Call Girls In Kurla ( Mumbai ) secure service
Call US 📞 9892124323 ✅ Kurla Call Girls In Kurla ( Mumbai ) secure service
 
Call Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance Booking
 
VIP Call Girl Service Andheri West ⚡ 9920725232 What It Takes To Be The Best ...
VIP Call Girl Service Andheri West ⚡ 9920725232 What It Takes To Be The Best ...VIP Call Girl Service Andheri West ⚡ 9920725232 What It Takes To Be The Best ...
VIP Call Girl Service Andheri West ⚡ 9920725232 What It Takes To Be The Best ...
 
Vip Call US 📞 7738631006 ✅Call Girls In Sakinaka ( Mumbai )
Vip Call US 📞 7738631006 ✅Call Girls In Sakinaka ( Mumbai )Vip Call US 📞 7738631006 ✅Call Girls In Sakinaka ( Mumbai )
Vip Call US 📞 7738631006 ✅Call Girls In Sakinaka ( Mumbai )
 
WhatsApp 📞 Call : 9892124323 ✅Call Girls In Chembur ( Mumbai ) secure service
WhatsApp 📞 Call : 9892124323  ✅Call Girls In Chembur ( Mumbai ) secure serviceWhatsApp 📞 Call : 9892124323  ✅Call Girls In Chembur ( Mumbai ) secure service
WhatsApp 📞 Call : 9892124323 ✅Call Girls In Chembur ( Mumbai ) secure service
 
Dharavi Russian callg Girls, { 09892124323 } || Call Girl In Mumbai ...
Dharavi Russian callg Girls, { 09892124323 } || Call Girl In Mumbai ...Dharavi Russian callg Girls, { 09892124323 } || Call Girl In Mumbai ...
Dharavi Russian callg Girls, { 09892124323 } || Call Girl In Mumbai ...
 
Booking open Available Pune Call Girls Shivane 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Shivane  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Shivane  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Shivane 6297143586 Call Hot Indian Gi...
 
High Class Call Girls Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
High Class Call Girls Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsHigh Class Call Girls Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
High Class Call Girls Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
 
Basic concepts related to Financial modelling
Basic concepts related to Financial modellingBasic concepts related to Financial modelling
Basic concepts related to Financial modelling
 
03_Emmanuel Ndiaye_Degroof Petercam.pptx
03_Emmanuel Ndiaye_Degroof Petercam.pptx03_Emmanuel Ndiaye_Degroof Petercam.pptx
03_Emmanuel Ndiaye_Degroof Petercam.pptx
 
The Economic History of the U.S. Lecture 18.pdf
The Economic History of the U.S. Lecture 18.pdfThe Economic History of the U.S. Lecture 18.pdf
The Economic History of the U.S. Lecture 18.pdf
 
Best VIP Call Girls Noida Sector 18 Call Me: 8448380779
Best VIP Call Girls Noida Sector 18 Call Me: 8448380779Best VIP Call Girls Noida Sector 18 Call Me: 8448380779
Best VIP Call Girls Noida Sector 18 Call Me: 8448380779
 

USB flash drive security

  • 1.
  • 2. USB Drive Security RisksUSB Drive Security Risks
  • 3. Preview • USB drive trend • Risks of storing data in USB drive • What we need to do • How to do it • Why we should do it now • conclusion
  • 4. • USB thumb drive • USB memory stick • USB jump drive • First sold in year 2000 • weigh less than 2 ounces • Intended to make life easier for users HistoryHistory
  • 5. 1)Wi-Fi 2) Digital Camera 3) MP3 Player/IPOD 4) Email 5) Floppy Disks 6) CDR, CDRW, DVD-RW 7) Remote control software Different ways to get data out. AlternativesAlternatives
  • 6. • Small physical size • More durable • Fast Speed --3MB/s • Big capacity • Low price • More functionality • Plug-and-Play -1million read & write cycle Why Choose USB ?Why Choose USB ?
  • 7. Greatest benefit = Greatest security risk !Greatest benefit = Greatest security risk !
  • 8. 85million units sold in 2007 Only few buyers thought about the drives’ security implications. -Gartner
  • 9. According to security firm Vontu • >50% of 480 surveyed tech- professionals’ USB drives contain unprotected confidential information • 1 USB drive is lost at work each month – Unlike laptop, storage devices are small and cheap. Many employees do not report them missing as they would a laptop.
  • 10.
  • 11. • Corruption of data • Virus Transmissions • Loss of media • Loss of confidentiality RisksRisks
  • 12. • Corruption of data – Occur if the drive is uncleanly dismounted –computer usually has no way of knowing when USB memory sticks are going to be removed – The OS will attempt to handle unexpected disconnects as best it can, so often no corruption will occur. RisksRisks
  • 13. • Corruption of data • Virus Transmissions Whenever files are transferred between two machines there is a risk that viral code or some other malware will be transmitted, and USB memory sticks are no exception. • April 2008, a batch of HP USB flash drives were shipped with a virus. • November 2007, Maxtor USB Hard Drives Ship Virus Infected RisksRisks
  • 14. • Corruption of data • Virus Transmissions • Loss of Media – A drawback to the small size is that they are easily misplaced, left behind, or otherwise lost. – All data is lost too RisksRisks
  • 15. • Corruption of data • Virus Transmissions • Loss of Media • Loss of Confidentiality – If the stick then finds its way into the hands of a competitor, then the company has suffered a much greater loss than simply the replacement cost of the drive. – A $25 thumb drive can contain $25 million worth of information on it RisksRisks
  • 16. • The personal information of 6,500 current and former University of Kentucky students was reported stolen May 26 after the theft of a professor's flash drive. The drive has not been recovered. • April 2006, Flash drives holding sensitive and classified military information turned up for sale at a bazaar near Afghanistan. Investigators recovered many drives, but an unknown number are still missing. • In October, Wilcox Memorial Hospital in Hawaii, informed 120,000 current and former patients that a flash drive containing their personal information — names, addresses, Social Security numbers and identifying medical record numbers — was lost. It has yet to be recovered. Recent IncidentsRecent Incidents
  • 18. Corruption of Data • dismount the device according to the OS documentation.
  • 19. Virus Transmission • Some USB memory sticks include a physical switch that can put the drive in read-only mode. – keep the host computer from writing or modifying data (including viruses) on the drive • If files need to be transferred from an un- trusted machine, scan the USB drive after copying files from it.
  • 20. Loss of Media • attaching flash drives to keychains, necklaces and lanyards.
  • 21. Loss of Confidentiality • avoidance – no private data is stored on the drive • severely limiting • encryption. – allows any data to be stored on the drive but renders the data useless without the required password,
  • 22. Encryption – fingerprint scanning USB drive • run your finger over the scanner and it will be ready to read your files. • Very expensive – Pre-installed encryption software • Cost 2X more – encryption software • Commercial • Free
  • 23. • easy and fast • encrypt files/folders. • 128 bits encryption
  • 24. • On-the-fly (Real Time) • Encrypt Automatically • encrypt virtual partition • 256 bit AES (military- grade) encryption
  • 25. • Can’t completely eliminate all the risk
  • 26. • Significantly reduce all the risks • Kick-back and relax If You DoIf You Do • It will be too late when you lost the drive or your drive got infected by virus. Recognize the thumb-drive threat and take action If You Don’tIf You Don’t
  • 27. • USB drive will become more popular and security incidents will occur more often • 4 steps to reduce – Data corruption – Virus transmissions – Loss of media – Loss of confidentiality ConclusionConclusion

Notas do Editor

  1. USB memory sticks differ from other types of removable media, such as CD and DVD-ROMs because the . Users of USB memory sticks usually need to alert the computer that they intend to remove the device, otherwise the computer will be unable to perform the necessary clean-up functions required to disconnect the device,