Preview

Usb Security Threats

Good Essays
Open Document
Open Document
651 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Usb Security Threats
USB Security Threats
Information Security is a vague term used to describe any aspect of a system used either intentionally or not for protection of information systems. Although security of information systems ranges from the personnel accessing the system to the hardware and software specifically designed for security, it also includes external devices such as a Universal Serial Bus (USB) drive. The practicality of such devices make them popular for users at every level within an organization but the security risks involved with users transferring data from machine to machine quickly becomes a struggle for security and management personnel. The article written by Pfleging (2008) makes many statements regarding the security issues with USB drives some of which are analyzed below. The article, The Forgotten Security Hole: USB (Pfleging, 2008) states USBs are “potentially one of the worst security holes you have.” Although the risks associated with transferring data from one machine to another are significant, many other inadequate security practices could have at least an equal effect such as improper disposal. Loeb (2000) reported of a legal case in which a CIA agent allegedly “sold 25 laptop computers at public auction 'while still containing Top Secret information on their respective hard drives. '" Incidents such as this could be catastrophic. Pfleging (2008) also writes how compromising confidential information “can involve privacy laws at the state and federal levels, dictating large fines. An organization 's reputation, and thereby its ability to attract new investors or customers, might be damaged or even destroyed.” Any corporation with an incident such as this could easily suffer great financial losses in today’s technical and struggling economy. Swartz (2006) states, “according to the 2005 “Computer Security Institute (CSI)/Federal Bureau of Investigation (FBI) Computer Crime and Security Survey," average financial losses from unauthorized access



References: CNET. (n.d.). USB Disk Security 5.1.0.15. CNET download. Retrieved September 12, 2009, from http://download.cnet.com/USB-Disk-Security/ Pfleging, B. (2008). The Forgotten Security Hole: USB. Inc. Technology. Retrieved September 8, 2009, from http://technology.inc.com/security/articles/200807 Retrieved September 10, 2009, from http://www.thefreelibrary.com/Safeguarding +corporate+secrets%3a+after+three+insiders+are+accused+of...-a0183551075

You May Also Find These Documents Helpful

  • Powerful Essays

    Continuing of Richman Investments has expanded with more offices, locations and clients, which the needs of protection for assets are greater. I have decided to implement the following policy for removable media: Richman Investments staff may only use Richman Investments’ removable media in their work computers. Richman Investments removable media may not be connected to or used in computers that are not owned or leased by the Richman Investments without explicit permission of the Richman Investments IT manager. Sensitive information should be stored on removable media only when required in the performance of your assigned duties or when providing information required by other state or federal agencies. When sensitive information is stored on removable media, it must be encrypted in accordance with the Richman Investments’ Acceptable Encryption Policy. Security assurance and user-friendly sites are required if Richman Investments is to be successful at attracting customers to their Internet sites. It is therefore important to be able to understand the business requirements and be able to translate these into a public network presence with security in mind. The Digital revolution of the 21st Century has not been achieved without its consequences. Real time business requirements and economic drivers have forced rapid changes to the methods used to conduct business-to-business and business to client communication. The Internet has now become a convenient and economic deployment medium for global business. For Richman Investments Computer User’s Policy, although employees are given PCs so they can deliver the task that they are assigned, it must be understood that these PCs are property of Richman Investments and must not be abused for personal use. Computer resources are expensive and so offensive material must not be…

    • 1444 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    CHAPTER3 REVEIW

    • 527 Words
    • 3 Pages

    a. The CPU tells the RAM which address holds the data that the CPU wants to read…

    • 527 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Is 305 Week 3 Quiz

    • 577 Words
    • 3 Pages

    The use of USB’s or disk, the files could contain viruses and infect other files or applications on the network. No acceptable user’s policy, AUP, or lack of training employees on the correct usage of the network. The users staying signed into their…

    • 577 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Using removable devices on more than one computer creates the possibility of infecting computers and diskettes with a computer virus. This exposes the computers of the college, your personal computer, and any others you may be using to potentially damaging viruses. The college has aggressive anti-virus procedures in place to protect its computers, but cannot guarantee that a virus might not temporarily infect one of its machines. It is your responsibility to protect all computers under your control and use and ensure that each diskette you use, whenever or wherever you use it, has been scanned with anti-virus software. Since new viruses arise continually, your anti-virus software must be kept current. Moreover, since no anti-virus software will find every virus, keeping backup copies is extremely…

    • 3673 Words
    • 15 Pages
    Good Essays
  • Better Essays

    CLI commands that are used in a switch and in a router are the same. Most CLI commands are configured in the global configuration mode. It’s always good practice to start with the command erase…

    • 1491 Words
    • 12 Pages
    Better Essays
  • Better Essays

    References: Cereola, S. J., & Cereola, R.J. (2011). Breach of Data at TJX: An Instructional Case Used to Study COSO and COBIT with a Focus on Computer Controls, Data Security, and Privacy Legislation. American Accounting Association, 26 (3). Retrieved from ProQuest Business database on October 5th, 2011.…

    • 1608 Words
    • 7 Pages
    Better Essays
  • Better Essays

    References: Conklin, W. A., White, G., Williams, D., Davis, R., & Cothren, C. (2012). Principles of computer security: CompTIA Security+™ and beyond (3rd ed.). New York, NY: McGraw Hill.…

    • 1432 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Lesson 1

    • 1154 Words
    • 7 Pages

    9. A USB drive should never be used to backup company file data. USB drives should only be used to transfer data from one computer to another within the company.…

    • 1154 Words
    • 7 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IS 4560 Week 1

    • 309 Words
    • 2 Pages

    Data breaches that could lead to identity theft, by sector - the danger of data breaches are of particular importance for organizations that store and manage large amounts of personal information. Not only can compromises that result in the loss of personal data undermine customer and institutional confidence, result in costly damage to an organization’s reputation, and result in identity theft that may be costly for individuals to recover from, they can also be financially debilitating to organizations.…

    • 309 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Almost everyone now days has some computer device on them almost all the time, people are always checking social media through smartphones or performing some online activity. The online infrastructure has endpoints; these endpoints transmit data. Businesses use many technologies to assist them in providing certain personal information that needs to be protected. For example, law enforcement uses computer devices to search for information on a suspect. There are other technologies such as monitoring devices from hospitals that allow real-time feedback of the patient's vitals. Many individuals use laptops or smartphones to access his or her online banking account to transfer, withdraw, or deposit money. All of the information that is gathered and stored online becomes vulnerable, and if…

    • 780 Words
    • 3 Pages
    Better Essays
  • Good Essays

    IS3110 Lab 6

    • 734 Words
    • 3 Pages

    A user inserts a CD or USB hard drive with personal photos, music, and videos on organization owned computers. A good antivirus program and have all devices scanned as soon as they are plugged in. Educate employees Disable optical drives/USB ports.…

    • 734 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Data breaches and cyber-attack frequency has dramatically increased in recent years, with the advancement of technology and the prevalence of more “cloud” storage and remote access servers. In Mr. Horton’s article, he remarks on the high cost a data breach can have on both finances and a company’s reputation. (Horton, 2014) Citing the Ponemon Institute’s 2013 Cost of a Data Breach Study, Horton goes on to state that “data breaches can cost an average organization more than $5 million per incident.” (Ponemon Institute, 2013)…

    • 499 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Computers are very important and help us in many ways but they can also cause us problems.Some of the problems are,backache which is caused by improper sitting posture and can be prevented by sitting upright with your back resting on the backrest chair.The other problem is eye strain which can be caused by radiations emitted by the monitor and can be prevented by regulating the amount of light from the monitor and avoid using a flickering monitor.A neck ache is caused by putting the monitor above the eye level and can be avoided by positioning your monitor on the same level with your eyes.…

    • 528 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Steep Analysis

    • 810 Words
    • 4 Pages

    Hackers can jeopardize the company by acquiring information about it and selling it to its…

    • 810 Words
    • 4 Pages
    Good Essays
  • Good Essays

    5. Details such as bank records, can be hacked into, and thus your personal information is no longer as safe as it used to be.…

    • 808 Words
    • 4 Pages
    Good Essays