Iron Key and Portable Drive Security Zakary Littlefield.

Slides:



Advertisements
Similar presentations
GCSE ICT Networks & Security..
Advertisements

ARMORINO Portable Privacy Platform. µcrypt µcrypt Armorino Information always has a value that constantly growing under pressure of new.
© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Ceedo for Citrix Optimal User Experience & Maximum IT Control Ceedo for Call.
CS470, A.SelcukCryptographic Authentication1 Cryptographic Authentication Protocols CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Hardware Cryptographic Coprocessor Peter R. Wihl Security in Software.
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
Windows 8: Windows To Go Overview Zvezdan PavkovicTanya Koval Senior ConsultantArchitect WCL333.
Ironkey Secure Portable Drives By Evan Wechsler and Daniel Kolb.
Security Presented by : Qing Ma. Introduction Security overview security threats password security, encryption and network security as specific.
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
Software Security Threats Threats have been an issue since computers began to be used widely by the general public.
Cyber Security and Key Management Models Smart Grid Networks The Network System Key Management and Utilization Why Hardware Security Christopher Gorog,
CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 14 Jonathan Katz.
Factors to be taken into account when designing ICT Security Policies
Computer Security 1 Keeping your computer safe. Computer Security 1 Computer Security 1 includes two lessons:  Lesson 1: An overview of computer security.
10 Essential Security Measures PA Turnpike Commission.
Computer Security Dylan, Robert, Matanel, Jordan.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Internet Security In the 21st Century Presented by Daniel Mills.
New Data Regulation Law 201 CMR TJX Video.
Authentication Approaches over Internet Jia Li
11 SECURING INTERNET MESSAGING Chapter 9. Chapter 9: SECURING INTERNET MESSAGING2 CHAPTER OBJECTIVES  Explain basic concepts of Internet messaging. 
Security The Kingsway School. Accidental Data Loss Data can be lost or damaged by: Hardware failure such as a failed disk drive Operator error e.g. accidental.
USBK Overview Ver:1.0, 8 February USB Sticks 350 million USB Sticks are in use worldwide 155 million USB sticks were sold in 2008 and sales reached.
Secure Online USB Login System. Everything is going online Social Interactions Banking Transactions Meetings Businesses... including all sorts of crimes.
© Pearson Education Limited, Chapter 5 Database Administration and Security Transparencies.
Safe Computing Outreach Joseph Howard Undergraduate Research Assistant 05/01/2015 Disclaimer: This research was supported by the National Science Foundation.
Configuration Overview The BIOS (basic input/output system) is an important motherboard component. The BIOS has the following functions: Holds and executes.
Chapter 15: Security (Part 1). The Security Problem Security must consider external environment of the system, and protect the system resources Intruders.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Essential Computer Concepts
Section 6 Theory Software Copyright, Viruses and Hacking.
Security and backups GCSE ICT.
Malicious Attack Corporate Awareness and Walk through Date 29 September 2011.
Vocabulary. Touch Screen Touch Pad Processor The processor is the brains of the computer. Intel and AMD are the primary manufacturers of the more.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
1 Class 15 System Security. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized data access,
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
INTERNET SAFETY FOR KIDS
Data Security. Unauthorized Access Natural disaster Accidentals Destruction ( Hard ware failure )
Wireless and Mobile Security
Software for Cyber Hygiene © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Web Security.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
 Encryption provides confidentiality  Information is unreadable to anyone without knowledge of the key  Hashing provides integrity  Verify the integrity.
CIW Lesson 8 Part B. Malicious Software application that installs hidden services on systems term for software whose specific intent is to harm computer.
Scott Hervoyavich December 6 th, 2011 CYBERCRIME.
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
Understanding Security Policies Lesson 3. Objectives.
Computer Literacy BASICS: A Comprehensive Guide to IC 3, 5 th Edition Lesson 10 Data and Hardware Protection 1 Morrison / Wells / Ruffolo.
Presented by Kartik Patel
Hotspot Shield Protect Your Online Identity
Chapter 1: Introduction
Security and Encryption
Hardware Cryptographic Coprocessor
Lecture 14: Business Information Systems - ICT Security
Introduction to Computers
Things To Avoid: 1-Never your password to anyone.
Waterproof And Shock Resistant
Waterproof And Shock Resistant
Waterproof And Shock Resistant
The bios.
G061 - Network Security.
Presentation transcript:

Iron Key and Portable Drive Security Zakary Littlefield

Flash Drive Security Problems Lost Drives Sensitive Information Viruses and Malware Data Theft

Solutions Educate the users. Lock your system. Anti-virus Include return info on the drive. Use third party software to restrict USB drive use

Hardware Encryption Uses up to 256 bit AES encryption. This meets the FIPS Level 3 standards. When drive is first used, a random number is generated for the encryption key. The key is never loaded onto the system, so the key is not vulnerable to traditional attacks. Encryption can never be turned off, either accidentally or on purpose.

Design Tamper Resistant Design all circuit and components are surrounded with a tough epoxy compound Firmware protects against power analysis, temperature and probing attacks A thin film metal coating surrounds the onboard memory to prevent electrical scanning

Self-Defending Uses an internal password counter on the cryptographic chip, rather than storing that counter in flash memory. Also, there is a global counter of failed password attempts. And if a maximum number of incorrect passwords are entered, the encryption keys and data are all securely erased. Has defense mechanisms for when the drive is inserted into a possibly insecure computer.

Internet Security Can store your remembered passwords securely The online manager can only be accessed with your password and the Iron Key inserted into a drive. The Iron Key site uses the image for mutual authentication. Firefox can be installed on the drive and can run a secure session.

cure_USB_drives?taxonomyId=18&pageNumber=9 References

Questions?