12.07.2015 Views

Contributors - CyberSecurity Malaysia

Contributors - CyberSecurity Malaysia

Contributors - CyberSecurity Malaysia

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

10.ConclusionReferencesUSB removable devices are quickly becoming a “must have”.Now almost everyone has one, be it flash drives, externalhard drives or many others. It is also becoming a favoritegift for conference attendees. The medium for connectionto a PC is via the USB port.As reported in “USB devices spreading viruses” (Ref[11]), Gunter Ollmann, chief security strategist for IBM'sISS security division said, “Thumb drives aren't the onlyculprits; any device that plugs into a USB port – includinggadgets like lights, fans, speakers, toys, even a digitalmicroscope – can be used to spread malware”. Therefore,we can say that the risks get bigger each time a new deviceis USB supported.Normally, people diligently follow security practices likeencrypting sensitive information, encrypting emails,updating antivirus softwares, etc, but USB ports are alwaysleft unprotected.Use of USB ports come with risks as mentioned earlier inthis article. The risks should not be ignored and should behandled appropriately by implementing countermeasuressuitable for you and your organisation. •[1] USB Implementers Forum Website,http://www.usb.org/developers/docs/[2] Marshall Brain, “How USB Ports Work”,http://computer.howstuffworks.com/usb.htm[3] DeviceLock Website,http://www.devicelock.com/dl/[4] Safend Protector Website,http://www.safend.com/65-en/Safend%20Protector.aspx[5] MyUSBOnly Website,http://www.myusbonly.com/usb-security-devicecontrol/index.php[6] Common Criteria Portal,http://www.commoncriteriaportal.org/[7] “SanDisk Cruzer Enterprise Flash Drives EarnCertification”, October 2009,http://www.securitywatch.co.uk/2009/10/30/sandisk-cruzer-enterprise-flash-drives-earncertification/[8] FIPS PUB 140-2, Security Requirements forCryptographic Modules,http://csrc.nist.gov/publications/fips/fips140-2/fips1402.pdf[9] Iron Key Enterprise Website,http://www.ironkey.com/enterprise[10] Charles Arthur, “Windows virus infects 9mcomputers”, January 2009,http://www.guardian.co.uk/technology/2009/jan/19/downadup-conficker-kido-computer-infection[11] Elinor Mills, “USB devices spreading viruses”,November 2008,http://news.cnet.com/8301-1009_3-10104496-83.html[12] Jake Shores, “USB Flash Drive Security”, May 2009,http://www.brighthub.com/computing/smbsecurity/articles/2043.aspx[13] Brett Callow, “How to Enforce a Read-Only Policy onUSB Drives”, May 2009,http://www.brighthub.com/computing/smbsecurity/articles/5995.aspx

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!