Issues to Consider when Choosing a Secure USB Flash Drive Solution Brian Compton College of Technology – University of Houston Issues to Consider when.

Slides:



Advertisements
Similar presentations
Digital Certificate Installation & User Guide For Class-2 Certificates.
Advertisements

Installation & User Guide
Distributed Data Processing
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
COMPREHENSIVE APPROACH TO INFORMATION SECURITY IN ADVANCED COMPANIES.
Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
© 2012 All rights reserved to Ceedo. Enhanced Mobility with Tighter Security.
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility.
Digital Certificate Installation & User Guide For Class-2 Certificates.
Lecture 19 Page 1 CS 111 Online Protecting Operating Systems Resources How do we use these various tools to protect actual OS resources? Memory? Files?
Sanitizing Data from Storage Devices with a Live CD Brian Compton College of Technology – University of Houston Sanitizing Data from Storage Devices with.
For further information computersecurity.wlu.ca
Course ILT Security overview Unit objectives Discuss network security Discuss security threat trends and their ramifications Determine the factors involved.
Security+ Guide to Network Security Fundamentals
A Guide to Choosing a Secure USB Flash Drive Solution Brian Compton College of Technology – University of Houston A Guide to Choosing a Secure USB Flash.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Iron Key and Portable Drive Security Zakary Littlefield.
SAM for Mobile Device Management Presenter Name. of employees spend at least some portion of their time working outside their office. Mobility is the.
©2011 Kingston Technology Corporation. All rights reserved. All trademarks and registered trademarks are the property of their respective owners. Best.
Term 2, 2011 Week 3. CONTENTS Network security Security threats – Accidental threats – Deliberate threats – Power surge Usernames and passwords Firewalls.
Certificate and Key Storage Tokens and Software
1. Market Issues 2. CSG Strategy 3. The Concept of Toshiba EasyGuard 4. Core Technologies of Toshiba EasyGuard 5. Future Directions of Toshiba EasyGuard.
New Data Regulation Law 201 CMR TJX Video.
UniKey Software Protection Solutions, Products & Services All Rights Reserved © SecuTech Solution Inc.
Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices David Clapp – Intuitive.
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
PHASE 3: SYSTEMS DESIGN Chapter 8 System Architecture.
Chapter 10: Authentication Guide to Computer Network Security.
Information Security Decision- Making Tool What kind of data do I have and how do I protect it appropriately? Continue Information Security decision making.
Market Trends Enterprise Web Applications Cloud Computing SaaS Applications BYOD Data Compliance Regulations 30 Second Elevator Pitch Web browsers have.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
USBK Overview Ver:1.0, 8 February USB Sticks 350 million USB Sticks are in use worldwide 155 million USB sticks were sold in 2008 and sales reached.
Information Systems Security for the Special Educator MGMT 636 – Information Systems Security.
Information Security Technological Security Implementation and Privacy Protection.
Secure Online USB Login System. Everything is going online Social Interactions Banking Transactions Meetings Businesses... including all sorts of crimes.
INFORMATION SECURITY THE NEXT GENERATION 13 th World Electronics Forum Israel Christopher Joscelyne Board Member & Membership Chairman AEEMA November 2007.
Session 16: Distribution of Geospatial Data 1 Distribution of Geospatial Data in the Public Environment Hazard Mapping and Modeling.
Lecture 18 Page 1 CS 111 Online Design Principles for Secure Systems Economy Complete mediation Open design Separation of privileges Least privilege Least.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Introducing Windows Vista Lesson 1. Skills Matrix Technology SkillObjective DomainObjective # Understanding Windows Vista System Requirements Identify.
BRING YOUR OWN DEVICE. BYOD AND THE IMPACT ON IT SECURITY BYOD and pressure employees put on IT organization to supply or allow consumer mobility devices.
SECURITY Research Data Management. Research Data Management Security Laptops go missing very regularly; Intel’s study in 2012 surveying 329 private and.
Portable SSH Brian Minton EKU, Dept. of Technology, CEN/CET)‏
Security considerations for mobile devices in GoRTT
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
The State of Computer & Data Security in Corporations Independent Survey.
Cloud Computing Project By:Jessica, Fadiah, and Bill.
Enforcing Cyber security in Mobile Applications – Public Sector Use Case SAPHINA MCHOME, VIOLA RUKIZA TANZANIA REVENUE AUTHORITY INFORMATION AND COMMUNICATION.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
1 Information Governance (For Dental Practices) Norman Pottinger Information Governance Manager NHS Suffolk.
What is Cloud Computing 1. Cloud computing is a service that helps you to perform the tasks over the Internet. The users can access resources as they.
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
Handling Personal Data & Security of Information Paula Trim, Information Officer, Children’s Strategic Services, Mon – Thurs 9:15-2:15.
Protecting Data at Rest Through Encryption CIO Summit November 30, 2007.
EAST AFRICAN DATA HANDLERS DATA SECURITY/MOBILITY
DATA SECURITY FOR MEDICAL RESEARCH
Recommending a Security Strategy
Firewalls.
CIS 333Competitive Success/tutorialrank.com
CIS 333 Education for Service-- tutorialrank.com.
COMPREHENSIVE APPROACH TO INFORMATION SECURITY IN ADVANCED COMPANIES
Personal Mobile Device Acceptable Use Policy Training Slideshow
Presentation transcript:

Issues to Consider when Choosing a Secure USB Flash Drive Solution Brian Compton College of Technology – University of Houston Issues to Consider when Choosing a Secure USB Flash Drive Solution Brian Compton College of Technology – University of Houston Problem Statement USB flash drives are cheap, small and abundant. Employees make use of these devices whether or not their employer is aware of the drive. If a company does not address the proper selection and integration of these devices into their security program, the growing use of small USB flash drives continue to be a security concern. Problem Statement USB flash drives are cheap, small and abundant. Employees make use of these devices whether or not their employer is aware of the drive. If a company does not address the proper selection and integration of these devices into their security program, the growing use of small USB flash drives continue to be a security concern. The Flash Drives are Here, Ready or Not There is no debate concerning the convenience and usefulness of USB flash drives. Sales statistics further prove the popularity of the devices. In 2008, USB flash drives are expected to sell 200 million units world-wide, with an average capacity of 1.5 gigabytes 1. Organizations need to take a stance concerning the use of flash drives in the workplace. It is important to remember that security needs to be flexible enough to accommodate new technology while maintaining protection and control of the company’s security 2. Simply ignoring the devices will not make them go away. Companies need to analyze these devices and decide if they can be useful for their particular technology needs. Organizations may often overlook the potential usefulness of secured flash drives. They offer more abilities other than just transporting and storing files. The Flash Drives are Here, Ready or Not There is no debate concerning the convenience and usefulness of USB flash drives. Sales statistics further prove the popularity of the devices. In 2008, USB flash drives are expected to sell 200 million units world-wide, with an average capacity of 1.5 gigabytes 1. Organizations need to take a stance concerning the use of flash drives in the workplace. It is important to remember that security needs to be flexible enough to accommodate new technology while maintaining protection and control of the company’s security 2. Simply ignoring the devices will not make them go away. Companies need to analyze these devices and decide if they can be useful for their particular technology needs. Organizations may often overlook the potential usefulness of secured flash drives. They offer more abilities other than just transporting and storing files. Conclusion Employees will continue to use USB flash drives in the workplace, whether or not their employer has an established policy governing their use. Due to the popularity of these items, it is in the best interest of organizations to address the proper use of these devices. Companies need to analyze the potential benefits of USB flash drive usage and decide if these benefits can be realized without degrading the company's security program. By researching the numerous factors surrounding the secure use of flash drives, organizations can make a sound decision regarding the appropriate flash drive and software combination to utilize. By using a set of guidelines to help in this decision, companies can make successful use of these ubiquitous devices. Conclusion Employees will continue to use USB flash drives in the workplace, whether or not their employer has an established policy governing their use. Due to the popularity of these items, it is in the best interest of organizations to address the proper use of these devices. Companies need to analyze the potential benefits of USB flash drive usage and decide if these benefits can be realized without degrading the company's security program. By researching the numerous factors surrounding the secure use of flash drives, organizations can make a sound decision regarding the appropriate flash drive and software combination to utilize. By using a set of guidelines to help in this decision, companies can make successful use of these ubiquitous devices. References 1.Chance, R. (2005). Understanding USB flash drives as portable infrastructure. 2.Christiansen, S. (Sep. 2, 2008). IT Security Strategy: Thinking Inside and Outside the Glass Box. Baseline. 3.O’Brian, B., Ericson, R., and Mearian, L. (Mar. 3, 2008). Review: 7 Secure USB Drives. Computerworld. 4.Senforce Technologies. (Jul. 2005). Best practices for managing and enforcing USB security. Headlines Another lost usb drive contains student information. Tax website shut down as memory stick with secret personal data of 12million is found in a car park. 12million-pub-car-park.html You are the weakest link. West Midlands Police Scrambles To Find Lost Memory Stick Containing Terror Suspects Data containing-terror-data/ References 1.Chance, R. (2005). Understanding USB flash drives as portable infrastructure. 2.Christiansen, S. (Sep. 2, 2008). IT Security Strategy: Thinking Inside and Outside the Glass Box. Baseline. 3.O’Brian, B., Ericson, R., and Mearian, L. (Mar. 3, 2008). Review: 7 Secure USB Drives. Computerworld. 4.Senforce Technologies. (Jul. 2005). Best practices for managing and enforcing USB security. Headlines Another lost usb drive contains student information. Tax website shut down as memory stick with secret personal data of 12million is found in a car park. 12million-pub-car-park.html You are the weakest link. West Midlands Police Scrambles To Find Lost Memory Stick Containing Terror Suspects Data containing-terror-data/ Issues to Consider when Choosing the Appropriate Secured Flash Drive Solution Organizations should not arbitrarily choose which flash drive or security software without taking into consideration many factors. This guide serves as a tool that can be used to help an organization make the right decision concerning the usage and implementation of secure USB flash drives. 1.Choose a hardware / software solution that uses AES encryption. The use government uses both 128 and 256 bit AES encryption. AES has not be cracked and can withstand attacks. 2.Consider platform compatibility. Some USB drives are compatible with Windows only. Consider what platforms are used within the organization and ensure the chosen device is compatible. 3.Look at bundled vs. third party software. Many drives come bundled with encryption software, however, this may not suit the company’s particular needs. Both the included software and available third party security software must be reviewed. 4.Authentication method. There are some drive models that use fingerprint authentication instead of passwords. These are more costly than other secure models, so the cost/benefit details need to be considered. 5.Review all possible uses for the flash drives. These devices can be used for more than just file transfer and transportation. A company needs to consider the numerous possible uses of the drive when considering the cost / benefit. 6.Do not just by cost alone. An organization should look at the desired outcomes for flash drive use and what will be the acceptable cost for achieving that outcome. 7.Enterprise integration. An organization must consider the overall impact on their security stance by choosing a secure flash drive solution. The decision must look at not just the device itself, but also how these devices and their various authentication methods will be handled company-wide. 8.Reputable supplier. Some flash drive models have been shipped with malware present on the device. An organization must ensure they are working with a reputable supplier. Check their credentials. 9.Do we really need them? If an organization comes to the conclusion that the cost / benefit of using secure flash drives does not make sense, then the company needs to take steps to prevent the use of USB flash drives. USB ports can be disabled on individual computers or third party software can assist in policing the use of USB ports. List is derived from all references. Issues to Consider when Choosing the Appropriate Secured Flash Drive Solution Organizations should not arbitrarily choose which flash drive or security software without taking into consideration many factors. This guide serves as a tool that can be used to help an organization make the right decision concerning the usage and implementation of secure USB flash drives. 1.Choose a hardware / software solution that uses AES encryption. The use government uses both 128 and 256 bit AES encryption. AES has not be cracked and can withstand attacks. 2.Consider platform compatibility. Some USB drives are compatible with Windows only. Consider what platforms are used within the organization and ensure the chosen device is compatible. 3.Look at bundled vs. third party software. Many drives come bundled with encryption software, however, this may not suit the company’s particular needs. Both the included software and available third party security software must be reviewed. 4.Authentication method. There are some drive models that use fingerprint authentication instead of passwords. These are more costly than other secure models, so the cost/benefit details need to be considered. 5.Review all possible uses for the flash drives. These devices can be used for more than just file transfer and transportation. A company needs to consider the numerous possible uses of the drive when considering the cost / benefit. 6.Do not just by cost alone. An organization should look at the desired outcomes for flash drive use and what will be the acceptable cost for achieving that outcome. 7.Enterprise integration. An organization must consider the overall impact on their security stance by choosing a secure flash drive solution. The decision must look at not just the device itself, but also how these devices and their various authentication methods will be handled company-wide. 8.Reputable supplier. Some flash drive models have been shipped with malware present on the device. An organization must ensure they are working with a reputable supplier. Check their credentials. 9.Do we really need them? If an organization comes to the conclusion that the cost / benefit of using secure flash drives does not make sense, then the company needs to take steps to prevent the use of USB flash drives. USB ports can be disabled on individual computers or third party software can assist in policing the use of USB ports. List is derived from all references. Why is this an issue? Even though flash drives are small, their storage capacities are large. Models with a two gigabyte storage capacity are cheap and common while some flash drive capacities go all the way up to 32 gigabytes. They are easy to use: just plug one into a USB port and drag-and- drop any number of files onto the device. Most flash drives do not encrypt data by default. All of these characteristics combine to form an extremely useful but potentially damaging device. Users can easily take gigabytes of sensitive data off of the corporate network and out of company premises. Once outside the confines of the business, unprotected USB flash drives can be easily lost or stolen. Companies that choose not to address these devices do so at their own peril. News headlines illustrate just how much data can be lost or stolen via these convenient devices. Why is this an issue? Even though flash drives are small, their storage capacities are large. Models with a two gigabyte storage capacity are cheap and common while some flash drive capacities go all the way up to 32 gigabytes. They are easy to use: just plug one into a USB port and drag-and- drop any number of files onto the device. Most flash drives do not encrypt data by default. All of these characteristics combine to form an extremely useful but potentially damaging device. Users can easily take gigabytes of sensitive data off of the corporate network and out of company premises. Once outside the confines of the business, unprotected USB flash drives can be easily lost or stolen. Companies that choose not to address these devices do so at their own peril. News headlines illustrate just how much data can be lost or stolen via these convenient devices. Table 1: Business applicable benefits of secure USB flash drives 1 User authentication Flash drives can contain token keys for use in a PKI infrastructure, enabling a two factor authentication scheme utilizing hardware and password File security Digital certificates can be safely stored on a secure flash drive, protecting them from computer failures and thefts Data storage/backup/archiveWith large storage capacities, entire databases can be encrypted and safely stored Portable softwareSoftware applications can be launched from the drive, even entire operating systems Copyright protectionFlash drives can be used in software licensing schemes, serving to protect software rights Flash Drives in the News Secondary school loses identifying student information for thousands of students. British government has to shut down a major tax service related website due to security breach caused by lost drive. Consulting firm misplaces a flash drive containing the identifying information about 84,000 prisoners. Memory stick containing details about suspected terrorists and terrorist cells is lost by police. Flash Drives in the News Secondary school loses identifying student information for thousands of students. British government has to shut down a major tax service related website due to security breach caused by lost drive. Consulting firm misplaces a flash drive containing the identifying information about 84,000 prisoners. Memory stick containing details about suspected terrorists and terrorist cells is lost by police. People Find reputable supplier. Are flash drives really needed? Technology Choose AES encryption. Platform compatibility. Bundled vs. third party software. Authentication method. Review all possible uses for drives. Processes Authentication method. Review all possible uses for drives. Do not judge by cost alone. Enterprise integration. Figure 1. This figure divides the issues concerning the selection of secure flash drive technology amongst the three security vulnerabilities: people, process, technology.