USBK Overview Ver:1.0, 8 February 2011. USB Sticks 350 million USB Sticks are in use worldwide 155 million USB sticks were sold in 2008 and sales reached.

Slides:



Advertisements
Similar presentations
© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Ceedo for Call Center Call Center on a Stick Ceedo for Call Center Presentation.
Advertisements

ARMORINO Portable Privacy Platform. µcrypt µcrypt Armorino Information always has a value that constantly growing under pressure of new.
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Encryption – First line of defense Plamen Martinov Director of Systems and Security.
This presentation will take a look at to prevent your information from being discovered by and investigator.
1 GoGo Key ™ Designed & created by Strong Bear, LLC.
Microsoft Confidential Solution Overview: Foxit Software Corporation’s PDF Security Suite.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Securing. Agenda  Hard Drive Encryption  User Account Permissions  Root Level Access  Firewall Protection  Malware Protection.
Data Security for Healthcare Facilities Debbie Abbott Health Information Consultant Resolutions (Int) Pty Ltd.
Windows 8: Windows To Go Overview Zvezdan PavkovicTanya Koval Senior ConsultantArchitect WCL333.
A Guide to Choosing a Secure USB Flash Drive Solution Brian Compton College of Technology – University of Houston A Guide to Choosing a Secure USB Flash.
Using Cryptographic ICs For Security and Product Management Misconceptions about security Network and system security Key Management The Business of Security.
Data Encryption Overview South Seas Corporation Jared Owensby.
Iron Key and Portable Drive Security Zakary Littlefield.
CIT  In this chapter you will learn how to:  Explain how hard drives store data  Describe the differences between traditional hard drives and.
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
©2011 Kingston Technology Corporation. All rights reserved. All trademarks and registered trademarks are the property of their respective owners. Best.
10 Essential Security Measures PA Turnpike Commission.
Confidential Computer Systems Group HD Lock for Toshiba Notebook August 3rd, 2006.
Sybase Confidential Propriety.iAnywhere ConfidentialiAnywhere Confidential Proprietary.Sybase Confidential Propriety. Addressing the Challenges of Device.
Introduction to HASP ® Software DRM Solutions, Products, Benefits All Rights Reserved © Aladdin Knowledge Systems.
Authentication Approaches over Internet Jia Li
Information Technology
CPU The CPU is a microchip that is installed on a motherboard and acts as the computer’s brain - performing calculations and coordinating the hardware.
Internal components, Backing Storage, Operating Systems Software
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Essential Computer Concepts
Chapter 19 Upgrading and Expanding Your PC. Getting Started FAQs: – Can I upgrade the processor in my PC? – Will adding RAM improve my PC’s performance?
Tutorial 11 Installing, Updating, and Configuring Software
Learning Targets Identify the external parts of the computer Identify examples of input devices Identify examples of output devices Define basic computer.
AtomPark Software is founded in The head office is located in Saint-Petersburg, Russia. Company is officially registered in the United States. AtomPark.
Week #7 Objectives: Secure Windows 7 Desktop
TRUSTPORT PRODUCT PORTFOLIO Marcela Parolkova Sales Director.
INFO1 – Practical problem solving in the digital world
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Cloud Computing Characteristics A service provided by large internet-based specialised data centres that offers storage, processing and computer resources.
PIN-on-Card New contact-less smart card with integrated PIN pad for secure user verification at unparalleled cost effectiveness.
“TK8 Safe” – Easy-to-use, secure password manager Download a free trial copy: Product Info Highlights TK8 Safe is a perfect password manager.
Chapter 1 Getting Started. 2Practical PC 5 th Edition Chapter 1 Getting Started In this Chapter, you will learn: − How to power up the computer − About.
ANDROID DATA CONFIDENTIALITY Tips and tools for keeping corporate confidential information confidential on Android Mobile Devices. Alex Mayer University.
Chapter 14 Supporting Windows 2000 Professional. 14 You Will Learn… n About the different operating systems within the Windows 2000 suite n About the.
Cloud Computing Project By:Jessica, Fadiah, and Bill.
1 What is a computer? A computer is an electronic device that allows you to process and store data (information). Data is entered into the computer by.
INTERNET SAFETY FOR KIDS
Software Security Seminar - 1 Chapter 10. Using Algorithms 조미성 Applied Cryptography.
Company small business cloud solution Client UNIVERSITY OF BEDFORDSHIRE.
DATA & COMPUTER SECURITY (CSNB414) MODULE 3 MODERN SYMMETRIC ENCRYPTION.
I NTRODUCTION TO N ETWORK A DMINISTRATION. W HAT IS A N ETWORK ? A network is a group of computers connected to each other to share information. Networks.
Sofia, 2008 Valery Konyavsky New Approaches to Ensure Cybersecurity VNIIPVTI All-Russia Research-and- Development Institute for Problems of Computing Equipment.
Introduction TO Network Administration
I NTRODUCTION TO N ETWORK A DMINISTRATION. W HAT IS A N ETWORK ? A network is a group of computers connected to each other to share information. Networks.
CEG 2400 FALL 2012 Windows Servers Network Operating Systems.
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
IPEmotion License Management PM (V1.2).
1 CPCS425: Information Security (Topic 5) Topic 5  Symmetrical Cryptography  Understand the principles of modern symmetric (conventional) cryptography.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
USB flash drive A flash drive consists of a small printed circuit board carrying the circuit elements and a USB connector, insulated electrically and protected.
Chapter 1 Getting Started
Common Methods Used to Commit Computer Crimes
Information Technology
LINUX WINDOWS Vs..
Software: Systems and Application Software
Presented by, K.K.Radhika.
UNIT 19 Data Security 2.
STRATEGIC ENCRYPTION
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Sales Presenter Secure Pro USB 3.0 Drive
The Ultimate Backup Solution.
Presentation transcript:

USBK Overview Ver:1.0, 8 February 2011

USB Sticks 350 million USB Sticks are in use worldwide 155 million USB sticks were sold in 2008 and sales reached to 174 million in 2009 * * Gartner Inc research report Ver:1.0, 8 February 2011

USB Sticks Compatibility on most platform the widespread usage of them for both transporting and storing data have resulted in, Storing vast amount of data Ease of use Mobility Physically small size Ver:1.0, 8 February 2011

Popularity at work 86% of enterprises use USB Sticks to store and exchange data Rate of carrying confidential company data on USB Sticks is %51 Ver:1.0, 8 February 2011

Risks exposed on USB Sticks Theft Loss Disclosure of Sensitive Data Data stored on unsecure, standard USB sticks means that data is constantly at risk for falling into wrong hands Result Ver:1.0, 8 February 2011

Reality with Numbers * Store confidential data on USB Sticks Not reporting the lost devices immediately * Ponemon Institute 2009 Lost with data Not reported Yes Ver:1.0, 8 February 2011

ISO/IEC For ISO/IEC certified companies, data security in removable media is not only a corporation option, it is a must Ver:1.0, 8 February 2011

Solution Security is possible without giving up “ mobility” benefit. Well-known and most popular way is encryption of data with strong algorithm Ver:1.0, 8 February 2011

AES ( Advanced Encryption Standard ) AES is the first publicly accessible and open encryption algorithm approved by the NSA* for top secret information * NSA: National Security Agency Currently, it is typically implemented in both software- based and hardware-based security solutions. Ver:1.0, 8 February 2011

Software programs employing AES encryption Software-based Solutions Ver:1.0, 8 February 2011

Risk with Software-based Solutions RiskDescription No ease of Plug & Play facility Driver installation on the host PC required, potentially a security risk Leaves “footprint” on computer Encryption is dependent on host PC which is leaving behind software footprints Difficult to prevent “Brute Force Attack” Brute force attacks guess the password or the encryption key. Software implementations can not thwart these attacks efficiently since they must use the host’s memory to store intermediate results, including the number of login/decryption attempts counter Difficult to prevent “Parallel Attack” A parallel attack is a brute force attack variant in which the attacker copies the encrypted data from the stolen USB stick, shares the data with as many computers as possible that are under his/her control, and then puts them to work in parallel to guess the password offline and unlock the encrypted data. By nature and design, software implementations can not prevent the attacker from easily copying the encrypted file from the USB stick and initiating a parallel offline attack. Ver:1.0, 3 December 2010

Disadvantage Advantage  Needs software installation  Depends on Operating System and its security  Open and Easy to Attacks (Brute Force, Parallel)  Weak, uses common memory or RAM to encryption keys  Needs software installation  Depends on Operating System and its security  Open and Easy to Attacks (Brute Force, Parallel)  Weak, uses common memory or RAM to encryption keys  “Usage of existing USB stick” provides “low-cost” solution At first this may look like a convenient and low-cost way. But, this solution is flawed and will be expensive in the long run because of its vulnerability! Result Software-based Solutions Ver:1.0, 8 February 2011

Secure USB Flash Drive solutions with AES encryption Hardware-based Solutions Ver:1.0, 8 February 2011

Hardware-based is more secure BenefitDescription Ease of Use ( plug&play) It does not require driver installation, nor any other type of software installation on the host PC No “footprint”No need of driver or software installation keeps the encryption independent of the PC while not leaving behind footprints. Encryption keys are securely stored Not using RAM or other common memory space to store encryption keys, and by the fact that the keys never leave the hardware Possible to prevent “Brute Force Attack” Access control and encryption are implemented by a dedicated chip located in hardware. When hackers run a brute force program on the host computer, this chip counts the number of attempts and destroy encryption keys after a predefined limit is reached. Ver:1.0, 8 February 2011

Price Comparison CapacityStandard USB Stick (Unit Price) AES-Encrypted Secure USB Sticks (Unit Price) 2 GB9 USD38 USD 4 GB15 USD40 USD 8 GB24 USD49 USD 16 GB50 USD76 USD 32 GB75 USD134 USD 64 GB140 USD270 USD * Patriot Bolt is referans for prices The price difference is so high when compared. Encrypted USB sticks are more expensive than standard ones. Ver:1.0, 8 February 2011

Hardware-based Solutions Disadvantage Advantage  Standard Capacity. Sold in 2GB,4GB,8GB etc. limited capacity  Expensive. Price difference is so high when compared with price of standard USB sticks.  Standard Capacity. Sold in 2GB,4GB,8GB etc. limited capacity  Expensive. Price difference is so high when compared with price of standard USB sticks.  Ease of use (Plug & Play)  Encryption keys are stored in a chip on hardware and never exported to host PC  Strength to attacks, possible to prevent  More secure than software- based  Ease of use (Plug & Play)  Encryption keys are stored in a chip on hardware and never exported to host PC  Strength to attacks, possible to prevent  More secure than software- based Secure but expensive ! Result Ver:1.0, 8 February 2011

There is always a better way! Ver:1.0, 8 February 2011

Difference Hardware-based Security Using low-cost, standard USB Sticks The advantages of both solutions are gathered Ver:1.0, 8 February 2011

Encryption Device featuring two USB ports, which provides encrypted link between host PC and peripheral USB Sticks / External Harddisks What is ? Ver:1.0, 8 February 2011

On-the-fly Encryption Original Data (Plain Text) Encrypted Data AES Key Host PC USB Stick / External Harddisk Ver:1.0, 8 February 2011

Function turn standard USB sticks and even external harddisks into portable safe secure transporting data with AES encryption strength %100 Security with AES-128bit Ver:1.0, 3 December 2010

It is a unique device as you can purchase today, that offers 128-bit AES hardware- based encryption, but without any internal storage area is not an encrypted USB Stick! Ver:1.0, 8 February 2011

Data Stored in USB Disks USB Sticks / External Harddisks are used as data storage area Host PC USB Stick / External Harddisk Ver:1.0, 8 February 2011

Secure but limited storage capacity - Unlimited Capacity 16GB USB Stick 32GB USB Stick Secure and “in any capacity” USB External Harddisk Ver:1.0, 8 February 2011

1- ∞ Usage More than one USB Stick / External harddisk can be used with the same USBK Host PC Your USB stick Another one Other one Ver:1.0, 8 February 2011

Cost Effective Encryption Cost per GByte reaches to 0$ As not limited in anyway, Ver:1.0, 8 February 2011

128-bit AES Hardware-based Encryption %100 of data is protected by hardware- based encryption Encrypted Data Host PC USB Stick / External Harddisk Original Data (plain text) Ver:1.0, 8 February 2011

Most secure AES mode -CBC mode Most solutions in market use ECB (Electronic Code Book) mode.It encrypts the blocks to look exactly the same. uses CBC ( Cipher Block Chaining), the most secure mode and is preferred by both NIST and NSA Original Data ECB modeCBC mode Ver:1.0, 8 February 2011

User ID Verification Password: User password is used to prevent unauthorized access ******** Host PC USB Stick / External Harddisk Ver:1.0, 8 February 2011

Secure Password: ******** Wrong Password AES key Password After 3 wrong password attempts, completely erases AES keys and user password Host PC USB Stick / External Harddisk Ver:1.0, 3 December 2010

Easy to Use No need to install driver or software on PC, it runs automatically (Auto-Run property) Ver:1.0, 8 February 2011

Graphic User Inteface (GUI) Management Software deployed on USBK supplies GUI (Graphic User Interface) for encryption keys and password Ver:1.0, 3 December 2010

Multiple Key Option * Customize your privacy policy by creating different encryption keys for your work and personal data * Available on model A103 and can be created up to 3 different encryption keys Host PC Key1 work Key 2 Ver:1.0, 8 February 2011

Oscilloscope Independent of Operating System Due to “Auto-Activation” property, possible to use on test & measurment equipments such as oscilloscope, EKG, etc. Host PC Ver:1.0, 8 February 2011

Technical Specifications Security Features Encryption Algorithm128 bit-AES (Advanced Encryption Standard) Encryption MethodHardware- based encryption AES ModeCBC (Cipher Block Chaining) mode AES KeyUser initiated or random key generator Number of AES keys1 (for A101 model) 3 (for A103 model) User AuthenticationPassword (min 4 –max 16 characters) Failed Password Procedure Return back to factory settings after 3 wrong password attempts System & Peripheral Features USBUSB 2.0 High Speed (USB 1.1 backward support) Plug&Play Driver & Software Requirements No need to install driver & Pop-up GUI for Windows (.net framework dependent) Ver:1.0, 8 February 2011

Summary with pictures Ver:1.0, 8 February 2011