A Guide to Choosing a Secure USB Flash Drive Solution Brian Compton College of Technology – University of Houston A Guide to Choosing a Secure USB Flash.

Slides:



Advertisements
Similar presentations
Digital Certificate Installation & User Guide For Class-2 Certificates.
Advertisements

Installation & User Guide
Distributed Data Processing
COMPREHENSIVE APPROACH TO INFORMATION SECURITY IN ADVANCED COMPANIES.
Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
© 2012 All rights reserved to Ceedo. Enhanced Mobility with Tighter Security.
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility.
Digital Certificate Installation & User Guide For Class-2 Certificates.
Lecture 19 Page 1 CS 111 Online Protecting Operating Systems Resources How do we use these various tools to protect actual OS resources? Memory? Files?
BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
Microsoft Confidential Solution Overview: Foxit Software Corporation’s PDF Security Suite.
Data Security for Healthcare Facilities Debbie Abbott Health Information Consultant Resolutions (Int) Pty Ltd.
All rights reserved © 2005, Alcatel Risk Awareness in Enterprise IT Processes and Networks  Dr. Stephan Rupp.
Course ILT Security overview Unit objectives Discuss network security Discuss security threat trends and their ramifications Determine the factors involved.
Security+ Guide to Network Security Fundamentals
Using Cryptographic ICs For Security and Product Management Misconceptions about security Network and system security Key Management The Business of Security.
Issues to Consider when Choosing a Secure USB Flash Drive Solution Brian Compton College of Technology – University of Houston Issues to Consider when.
Iron Key and Portable Drive Security Zakary Littlefield.
Security Awareness: Applying Practical Security in Your World
SAM for Mobile Device Management Presenter Name. of employees spend at least some portion of their time working outside their office. Mobility is the.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
©2011 Kingston Technology Corporation. All rights reserved. All trademarks and registered trademarks are the property of their respective owners. Best.
Certificate and Key Storage Tokens and Software
1. Market Issues 2. CSG Strategy 3. The Concept of Toshiba EasyGuard 4. Core Technologies of Toshiba EasyGuard 5. Future Directions of Toshiba EasyGuard.
New Data Regulation Law 201 CMR TJX Video.
UniKey Software Protection Solutions, Products & Services All Rights Reserved © SecuTech Solution Inc.
Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices David Clapp – Intuitive.
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
PHASE 3: SYSTEMS DESIGN Chapter 8 System Architecture.
Chapter 10: Authentication Guide to Computer Network Security.
Information Security Decision- Making Tool What kind of data do I have and how do I protect it appropriately? Continue Information Security decision making.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
USBK Overview Ver:1.0, 8 February USB Sticks 350 million USB Sticks are in use worldwide 155 million USB sticks were sold in 2008 and sales reached.
Information Systems Security for the Special Educator MGMT 636 – Information Systems Security.
Secure Online USB Login System. Everything is going online Social Interactions Banking Transactions Meetings Businesses... including all sorts of crimes.
INFORMATION SECURITY THE NEXT GENERATION 13 th World Electronics Forum Israel Christopher Joscelyne Board Member & Membership Chairman AEEMA November 2007.
Session 16: Distribution of Geospatial Data 1 Distribution of Geospatial Data in the Public Environment Hazard Mapping and Modeling.
Lecture 18 Page 1 CS 111 Online Design Principles for Secure Systems Economy Complete mediation Open design Separation of privileges Least privilege Least.
BUSINESS DRIVEN TECHNOLOGY
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
BRING YOUR OWN DEVICE. BYOD AND THE IMPACT ON IT SECURITY BYOD and pressure employees put on IT organization to supply or allow consumer mobility devices.
SECURITY Research Data Management. Research Data Management Security Laptops go missing very regularly; Intel’s study in 2012 surveying 329 private and.
Portable SSH Brian Minton EKU, Dept. of Technology, CEN/CET)‏
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
Cloud Computing Project By:Jessica, Fadiah, and Bill.
Enforcing Cyber security in Mobile Applications – Public Sector Use Case SAPHINA MCHOME, VIOLA RUKIZA TANZANIA REVENUE AUTHORITY INFORMATION AND COMMUNICATION.
Company small business cloud solution Client UNIVERSITY OF BEDFORDSHIRE.
Welcome Esuring Your File Sharing Solution is Secure and Compliant Hosts: Josh Bopp Rebekah Stevens Paisley Coxsey President Account Manager Relationship.
What is Cloud Computing 1. Cloud computing is a service that helps you to perform the tasks over the Internet. The users can access resources as they.
Handling Personal Data & Security of Information Paula Trim, Information Officer, Children’s Strategic Services, Mon – Thurs 9:15-2:15.
Protecting Data at Rest Through Encryption CIO Summit November 30, 2007.
Security Issues in Information Technology
EAST AFRICAN DATA HANDLERS DATA SECURITY/MOBILITY
Chapter 5 Electronic Commerce | Security Threats - Solution
Understanding The Cloud
DATA SECURITY FOR MEDICAL RESEARCH
Customer Guide to Limited-Time Offer
Chapter 5 Electronic Commerce | Security Threats - Solution
Firewalls.
CIS 333Competitive Success/tutorialrank.com
CIS 333 Education for Service-- tutorialrank.com.
Cloud Migration What to Consider When Switching Providers NAME: SYED TARIQ SHAH “WAQIF” REG NO: K1S18MCS0021 SUB: CLUSTER AND CLOUD COMPUTING.
COMPREHENSIVE APPROACH TO INFORMATION SECURITY IN ADVANCED COMPANIES
Personal Mobile Device Acceptable Use Policy Training Slideshow
Presentation transcript:

A Guide to Choosing a Secure USB Flash Drive Solution Brian Compton College of Technology – University of Houston A Guide to Choosing a Secure USB Flash Drive Solution Brian Compton College of Technology – University of Houston Problem Statement USB flash drives are cheap, small and abundant. Employees make use of these devices whether or not their employer is aware of the drive. If a company does not address the proper selection and integration of these devices into their security program, the growing use of small USB flash drives continue to be a security concern. Problem Statement USB flash drives are cheap, small and abundant. Employees make use of these devices whether or not their employer is aware of the drive. If a company does not address the proper selection and integration of these devices into their security program, the growing use of small USB flash drives continue to be a security concern. The Flash Drives are Here, Ready or Not There is no debate concerning the convenience and usefulness of USB flash drives. Sales statistics further prove the popularity of the devices. In 2008, USB flash drives are expected to sell 200 million units world-wide, with an average capacity of 1.5 gigabytes 1. Organizations need to take a stance concerning the use of flash drives in the workplace. It is important to remember that security needs to be flexible enough to accommodate new technology while maintaining protection and control of the company’s security 2. Simply ignoring the devices will not make them go away. Companies need to analyze these devices and decide if they can be useful for their particular technology needs. Organizations may often overlook the potential usefulness of secured flash drives. They offer more abilities other than just transporting and storing files. The Flash Drives are Here, Ready or Not There is no debate concerning the convenience and usefulness of USB flash drives. Sales statistics further prove the popularity of the devices. In 2008, USB flash drives are expected to sell 200 million units world-wide, with an average capacity of 1.5 gigabytes 1. Organizations need to take a stance concerning the use of flash drives in the workplace. It is important to remember that security needs to be flexible enough to accommodate new technology while maintaining protection and control of the company’s security 2. Simply ignoring the devices will not make them go away. Companies need to analyze these devices and decide if they can be useful for their particular technology needs. Organizations may often overlook the potential usefulness of secured flash drives. They offer more abilities other than just transporting and storing files. Conclusion Employees will continue to use USB flash drives in the workplace, whether or not their employer has an established policy governing their use. Due to the popularity of these items, it is in the best interest of organizations to address the proper use of these devices. Companies need to analyze the potential benefits of USB flash drive usage and decide if these benefits can be realized without degrading the company's security program. By researching the numerous factors surrounding the secure use of flash drives, organizations can make a sound decision regarding the appropriate flash drive and software combination to utilize. By using a set of guidelines to help in this decision, companies can make successful use of these ubiquitous devices. Conclusion Employees will continue to use USB flash drives in the workplace, whether or not their employer has an established policy governing their use. Due to the popularity of these items, it is in the best interest of organizations to address the proper use of these devices. Companies need to analyze the potential benefits of USB flash drive usage and decide if these benefits can be realized without degrading the company's security program. By researching the numerous factors surrounding the secure use of flash drives, organizations can make a sound decision regarding the appropriate flash drive and software combination to utilize. By using a set of guidelines to help in this decision, companies can make successful use of these ubiquitous devices. References 1.Chance, R. (2005). Understanding USB flash drives as portable infrastructure. 2.Christiansen, S. (Sep. 2, 2008). IT Security Strategy: Thinking Inside and Outside the Glass Box. Baseline. 3.O’Brian, B., Ericson, R., and Mearian, L. (Mar. 3, 2008). Review: 7 Secure USB Drives. Computerworld. 4.Senforce Technologies. (Jul. 2005). Best practices for managing and enforcing USB security. References 1.Chance, R. (2005). Understanding USB flash drives as portable infrastructure. 2.Christiansen, S. (Sep. 2, 2008). IT Security Strategy: Thinking Inside and Outside the Glass Box. Baseline. 3.O’Brian, B., Ericson, R., and Mearian, L. (Mar. 3, 2008). Review: 7 Secure USB Drives. Computerworld. 4.Senforce Technologies. (Jul. 2005). Best practices for managing and enforcing USB security. A Guide for Choosing the Appropriate Secured Flash Drive Solution Organizations should not arbitrarily choose which flash drive or security software without taking into consideration many factors. This guide serves as a tool that can be used to help an organization make the right decision concerning the usage and implementation of secure USB flash drives. 1.Choose a hardware / software solution that uses AES encryption. The use government uses both 128 and 256 bit AES encryption. AES has not be cracked and can withstand attacks. 2.Consider platform compatibility. Some USB drives are compatible with Windows only. Consider what platforms are used within the organization and ensure the chosen device is compatible. 3.Look at bundled vs. third party software. Many drives come bundled with encryption software, however, this may not suit the company’s particular needs. Both the included software and available third party security software must be reviewed. 4.Authentication method. There are some drive models that use fingerprint authentication instead of passwords. These are more costly than other secure models, so the cost/benefit details need to be considered. 5.Review all possible uses for the flash drives. These devices can be used for more than just file transfer and transportation. A company needs to consider the numerous possible uses of the drive when considering the cost / benefit. 6.Do not just by cost alone. An organization should look at the desired outcomes for flash drive use and what will be the acceptable cost for achieving that outcome. 7.Enterprise integration. An organization must consider the overall impact on their security stance by choosing a secure flash drive solution. The decision must look at not just the device itself, but also how these devices and their various authentication methods will be handled company-wide. 8.Do we really need them? If an organization comes to the conclusion that the cost / benefit of using secure flash drives does not make sense, then the company needs to take steps to prevent the use of USB flash drives. USB ports can be disabled on individual computers or third party software can assist in policing the use of USB ports. List is derived from all references. A Guide for Choosing the Appropriate Secured Flash Drive Solution Organizations should not arbitrarily choose which flash drive or security software without taking into consideration many factors. This guide serves as a tool that can be used to help an organization make the right decision concerning the usage and implementation of secure USB flash drives. 1.Choose a hardware / software solution that uses AES encryption. The use government uses both 128 and 256 bit AES encryption. AES has not be cracked and can withstand attacks. 2.Consider platform compatibility. Some USB drives are compatible with Windows only. Consider what platforms are used within the organization and ensure the chosen device is compatible. 3.Look at bundled vs. third party software. Many drives come bundled with encryption software, however, this may not suit the company’s particular needs. Both the included software and available third party security software must be reviewed. 4.Authentication method. There are some drive models that use fingerprint authentication instead of passwords. These are more costly than other secure models, so the cost/benefit details need to be considered. 5.Review all possible uses for the flash drives. These devices can be used for more than just file transfer and transportation. A company needs to consider the numerous possible uses of the drive when considering the cost / benefit. 6.Do not just by cost alone. An organization should look at the desired outcomes for flash drive use and what will be the acceptable cost for achieving that outcome. 7.Enterprise integration. An organization must consider the overall impact on their security stance by choosing a secure flash drive solution. The decision must look at not just the device itself, but also how these devices and their various authentication methods will be handled company-wide. 8.Do we really need them? If an organization comes to the conclusion that the cost / benefit of using secure flash drives does not make sense, then the company needs to take steps to prevent the use of USB flash drives. USB ports can be disabled on individual computers or third party software can assist in policing the use of USB ports. List is derived from all references. Why is this an issue? Even though flash drives are small, their storage capacities are large. Models with a two gigabyte storage capacity are cheap and common while some flash drive capacities go all the way up to 32 gigabytes. They are easy to use: just plug one into a USB port and drag-and-drop any number of files onto the device. Most flash drives do not encrypt data by default. All of these characteristics combine to form an extremely useful but potentially damaging device. Users can easily take gigabytes of sensitive data off of the corporate network and out of company premises. Once outside the confines of the business, unprotected USB flash drives can be easily lost or stolen. Companies that choose not to address these devices do so at their own peril. News headlines illustrate just how much data can be lost or stolen via these convenient devices. Why is this an issue? Even though flash drives are small, their storage capacities are large. Models with a two gigabyte storage capacity are cheap and common while some flash drive capacities go all the way up to 32 gigabytes. They are easy to use: just plug one into a USB port and drag-and-drop any number of files onto the device. Most flash drives do not encrypt data by default. All of these characteristics combine to form an extremely useful but potentially damaging device. Users can easily take gigabytes of sensitive data off of the corporate network and out of company premises. Once outside the confines of the business, unprotected USB flash drives can be easily lost or stolen. Companies that choose not to address these devices do so at their own peril. News headlines illustrate just how much data can be lost or stolen via these convenient devices. Flash Drives in the News Another Lost USB Drive Contains Student Information The University of Nevada, Reno is alerting current and former students over the loss of a USB drive containing student information. October 29th, mation_0 Tax website shut down as memory stick with secret personal data of 12million is found in a car park November secret-personal-data-12million-pub-car-park.html You are the weakest link PA Consulting loss of a memory stick containing personal data on every one of the 84,000 prisoners in England and Wales. May West Midlands Police Scrambles To Find Lost Memory Stick Containing Terror Suspects Data September find-lost-memory-stick-containing-terror-data/ Flash Drives in the News Another Lost USB Drive Contains Student Information The University of Nevada, Reno is alerting current and former students over the loss of a USB drive containing student information. October 29th, mation_0 Tax website shut down as memory stick with secret personal data of 12million is found in a car park November secret-personal-data-12million-pub-car-park.html You are the weakest link PA Consulting loss of a memory stick containing personal data on every one of the 84,000 prisoners in England and Wales. May West Midlands Police Scrambles To Find Lost Memory Stick Containing Terror Suspects Data September find-lost-memory-stick-containing-terror-data/ Table 1: Business applicable benefits of secure USB flash drives 1 User authentication Flash drives can contain token keys for use in a PKI infrastructure, enabling a two factor authentication scheme utilizing hardware and password File security Digital certificates can be safely stored on a secure flash drive, protecting them from computer failures and thefts Data storage/backup/archive With large storage capacities, entire databases can be encrypted and safely stored Portable softwareSoftware applications can be launched from the drive, even entire operating systems Copyright protectionFlash drives can be used in software licensing schemes, serving to protect software rights Flash Drive Considerations Figure 1: Basic questions that should be asked when consider flash drives.