SlideShare a Scribd company logo
1 of 1
USB Device Security
Security for USB Flash Drives
Incidents with USB Storage Devices
    Threats
    Detection
    Prevention

USB Storage Device Security Incidents
Recently,IBMfoundthatabatchofUSBmemorycardsithadshippedcontainedabootsectorvirus.Sati
Bains,ArthurAndersen•"ThereareanumberoftoolsthatcanbeusedthroughtheUSBport,suchasDe
bPloit,whichallowsanyusertogainfulladministrativeprivilegesbyexecutingasimpleapplication”
LauraTaylor,RelevantTechnologies,Inc.•ABlackHattalkentitled"Plugandroot:theUSBkeytotheki
ngdom,"describeshowresearchersmadeahardware-
basedTrojanhorseusingUSBportsDarrinBarrallandDavidDewey,SPIDynamics•HealthbossesinL
ancashirearefacingawkwardquestionsafterconfidentialmedicalrecordsof13cancerpatientsfou
ndtheirwayontoaportablememorystick,whichwasrepackagedandsoldasnewtoaCreweestateage
nt.JohnLeyden,TheRegister•AsmallsoftwarestartupbasedinIndiarecentlyreportedoneoftheirem
ployeeswascaughttryingtostealtheirIP(work)fromacomputerusingaUSBthumbdrive

More Related Content

Viewers also liked

Cuestionario de discapacidad (1) revisado
Cuestionario de discapacidad (1)  revisadoCuestionario de discapacidad (1)  revisado
Cuestionario de discapacidad (1) revisadoElenyConde
 
10 errores a evitar en tu reputación online
10 errores a evitar en tu reputación online10 errores a evitar en tu reputación online
10 errores a evitar en tu reputación onlineVíctor Puig
 
The Breaking Bad Guide to Storytelling
The Breaking Bad Guide to StorytellingThe Breaking Bad Guide to Storytelling
The Breaking Bad Guide to StorytellingKapost
 
INTRODUCCIÓN A LA ANATOMÍA Y TEJIDOS
INTRODUCCIÓN A LA ANATOMÍA Y TEJIDOS INTRODUCCIÓN A LA ANATOMÍA Y TEJIDOS
INTRODUCCIÓN A LA ANATOMÍA Y TEJIDOS Jessika Velasco
 
Нетрадиционные техногенные источники ювелирно-поделочного сырья
Нетрадиционные техногенные источники ювелирно-поделочного сырьяНетрадиционные техногенные источники ювелирно-поделочного сырья
Нетрадиционные техногенные источники ювелирно-поделочного сырьяkulibin
 
Asturiasnaturalezaviva 24 10 07 An
Asturiasnaturalezaviva 24 10 07 AnAsturiasnaturalezaviva 24 10 07 An
Asturiasnaturalezaviva 24 10 07 Anguest23830b
 
Test driven infrastructure development (2 - puppetconf 2013 edition)
Test driven infrastructure development (2 - puppetconf 2013 edition)Test driven infrastructure development (2 - puppetconf 2013 edition)
Test driven infrastructure development (2 - puppetconf 2013 edition)Tomas Doran
 
La fiabilidad de Google en la búsqueda de información sobre seguridad del pac...
La fiabilidad de Google en la búsqueda de información sobre seguridad del pac...La fiabilidad de Google en la búsqueda de información sobre seguridad del pac...
La fiabilidad de Google en la búsqueda de información sobre seguridad del pac...David Novillo Ortiz, MLIS, PhD
 
Prinses Paola afgewezen door Magritte
Prinses Paola afgewezen door MagrittePrinses Paola afgewezen door Magritte
Prinses Paola afgewezen door MagritteThierry Debels
 
Επενδυτικός Νόμος
Επενδυτικός ΝόμοςΕπενδυτικός Νόμος
Επενδυτικός ΝόμοςAll about Business
 
Insider's Guide to SXSW-i
Insider's Guide to SXSW-iInsider's Guide to SXSW-i
Insider's Guide to SXSW-iMSL
 
Leveraging social media for special events
Leveraging social media for special eventsLeveraging social media for special events
Leveraging social media for special eventsAmber Recker
 

Viewers also liked (17)

Cuestionario de discapacidad (1) revisado
Cuestionario de discapacidad (1)  revisadoCuestionario de discapacidad (1)  revisado
Cuestionario de discapacidad (1) revisado
 
fidel casa
fidel casafidel casa
fidel casa
 
MADLat 2014 keynote
MADLat 2014 keynoteMADLat 2014 keynote
MADLat 2014 keynote
 
10 errores a evitar en tu reputación online
10 errores a evitar en tu reputación online10 errores a evitar en tu reputación online
10 errores a evitar en tu reputación online
 
The Breaking Bad Guide to Storytelling
The Breaking Bad Guide to StorytellingThe Breaking Bad Guide to Storytelling
The Breaking Bad Guide to Storytelling
 
INTRODUCCIÓN A LA ANATOMÍA Y TEJIDOS
INTRODUCCIÓN A LA ANATOMÍA Y TEJIDOS INTRODUCCIÓN A LA ANATOMÍA Y TEJIDOS
INTRODUCCIÓN A LA ANATOMÍA Y TEJIDOS
 
Нетрадиционные техногенные источники ювелирно-поделочного сырья
Нетрадиционные техногенные источники ювелирно-поделочного сырьяНетрадиционные техногенные источники ювелирно-поделочного сырья
Нетрадиционные техногенные источники ювелирно-поделочного сырья
 
Asturiasnaturalezaviva 24 10 07 An
Asturiasnaturalezaviva 24 10 07 AnAsturiasnaturalezaviva 24 10 07 An
Asturiasnaturalezaviva 24 10 07 An
 
Test driven infrastructure development (2 - puppetconf 2013 edition)
Test driven infrastructure development (2 - puppetconf 2013 edition)Test driven infrastructure development (2 - puppetconf 2013 edition)
Test driven infrastructure development (2 - puppetconf 2013 edition)
 
La fiabilidad de Google en la búsqueda de información sobre seguridad del pac...
La fiabilidad de Google en la búsqueda de información sobre seguridad del pac...La fiabilidad de Google en la búsqueda de información sobre seguridad del pac...
La fiabilidad de Google en la búsqueda de información sobre seguridad del pac...
 
Quick mockup
Quick mockupQuick mockup
Quick mockup
 
Prinses Paola afgewezen door Magritte
Prinses Paola afgewezen door MagrittePrinses Paola afgewezen door Magritte
Prinses Paola afgewezen door Magritte
 
Persuasive content
Persuasive contentPersuasive content
Persuasive content
 
Επενδυτικός Νόμος
Επενδυτικός ΝόμοςΕπενδυτικός Νόμος
Επενδυτικός Νόμος
 
Disic mars2014
Disic mars2014Disic mars2014
Disic mars2014
 
Insider's Guide to SXSW-i
Insider's Guide to SXSW-iInsider's Guide to SXSW-i
Insider's Guide to SXSW-i
 
Leveraging social media for special events
Leveraging social media for special eventsLeveraging social media for special events
Leveraging social media for special events
 

Recently uploaded

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 

Recently uploaded (20)

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 

Usb device security

  • 1. USB Device Security Security for USB Flash Drives Incidents with USB Storage Devices  Threats  Detection  Prevention USB Storage Device Security Incidents Recently,IBMfoundthatabatchofUSBmemorycardsithadshippedcontainedabootsectorvirus.Sati Bains,ArthurAndersen•"ThereareanumberoftoolsthatcanbeusedthroughtheUSBport,suchasDe bPloit,whichallowsanyusertogainfulladministrativeprivilegesbyexecutingasimpleapplication” LauraTaylor,RelevantTechnologies,Inc.•ABlackHattalkentitled"Plugandroot:theUSBkeytotheki ngdom,"describeshowresearchersmadeahardware- basedTrojanhorseusingUSBportsDarrinBarrallandDavidDewey,SPIDynamics•HealthbossesinL ancashirearefacingawkwardquestionsafterconfidentialmedicalrecordsof13cancerpatientsfou ndtheirwayontoaportablememorystick,whichwasrepackagedandsoldasnewtoaCreweestateage nt.JohnLeyden,TheRegister•AsmallsoftwarestartupbasedinIndiarecentlyreportedoneoftheirem ployeeswascaughttryingtostealtheirIP(work)fromacomputerusingaUSBthumbdrive