US-CERT Cyber Security Tip ST08-001 -- Using Caution with USB Drives

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

                         Cyber Security Tip ST08-001
                        Using Caution with USB Drives

   USB drives are popular for storing and transporting data, but some of the
   characteristics that make them convenient also introduce security risks.

What security risks are associated with USB drives?

   Because USB drives, sometimes known as thumb drives, are small, readily
   available, inexpensive, and extremely portable, they are popular for storing
   and transporting files from one computer to another. However, these same
   characteristics make them appealing to attackers.

   One option is for attackers to use your USB drive to infect other computers.
   An attacker might infect a computer with malicious code, or malware, that
   can detect when a USB drive is plugged into a computer. The malware then
   downloads malicious code onto the drive. When the USB drive is plugged into
   another computer, the malware infects that computer.

   Some attackers have also targeted electronic devices directly, infecting
   items such as electronic picture frames and USB drives during production.
   When users buy the infected products and plug them into their computers,
   malware is installed on their computers.

   Attackers may also use their USB drives to steal information directly from a
   computer. If an attacker can physically access a computer, he or she can
   download sensitive information directly onto a USB drive. Even computers
   that have been turned off may be vulnerable, because a computer's memory is
   still active for several minutes without power. If an attacker can plug a
   USB drive into the computer during that time, he or she can quickly reboot
   the system from the USB drive and copy the computer's memory, including
   passwords,  encryption keys, and other sensitive data, onto the drive.
   Victims may not even realize that their computers were attacked.

   The most obvious security risk for USB drives, though, is that they are
   easily lost or stolen (see Protecting Portable Devices: Physical Security
   for more information). If the data was not backed up, the loss of a USB
   drive can mean hours of lost work and the potential that the information
   cannot be replicated. And if the information on the drive is not encrypted,
   anyone who has the USB drive can access all of the data on it.

How can you protect your data?

   There are steps you can take to protect the data on your USB drive and on
   any computer that you might plug the drive into:
     * Take advantage of security features - Use passwords and encryption on
       your USB drive to protect your data, and make sure that you have the
       information  backed  up in case your drive is lost (see Protecting
       Portable Devices: Data Security for more information).
     * Keep personal and business USB drives separate - Do not use personal USB
       drives on computers owned by your organization, and do not plug USB
       drives containing corporate information into your personal computer.
     * Use and maintain security software, and keep all software up to date -
       Use a firewall, anti-virus software, and anti-spyware software to make
       your computer less vulnerable to attacks, and make sure to keep the
       virus definitions current (see Understanding Firewalls, Understanding
       Anti-Virus Software, and Recognizing and Avoiding Spyware for more
       information). Also, keep the software on your computer up to date by
       applying any necessary patches (see Understanding Patches for more
       information).
     * Do not plug an unknown USB drive into your computer - If you find a USB
       drive, give it to the appropriate authorities (a location's security
       personnel, your organization's IT department, etc.). Do not plug it into
       your computer to view the contents or to try to identify the owner.
     _________________________________________________________________

     Author: Mindi McDowell
     _________________________________________________________________

     Produced 2008 by US-CERT, a government organization.

     Note: This tip was previously published and is being re-distributed 
     to increase awareness. 
  
     Terms of use
 
     <http://www.us-cert.gov/legal.html>
  
     This document can also be found at
 
     <http://www.us-cert.gov/cas/tips/ST08-001.html>
 

     For instructions on subscribing to or unsubscribing from this
     mailing list, visit <http://www.us-cert.gov/cas/signup.html>.
          
     
     

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)

iQEVAwUBSRCZy3IHljM+H4irAQIZkggAsxbz6lGzZJOV0mU8oJZAxQHcmqS3BNAd
ex/leZ58kfUbfMn1Hvcivkt4PXP6koMTleHravZb0lXFjuoxpm/ROckZAtKsO3ow
AaDkZuIOGdw+pKt5fc4if/oKv2XfWWgwcCXcxX9t7vd3dThpOpsnNo549qY5JSzG
dDMruMk842tpq99/+TgN0tQ49ES+cU7V4Kssz4uAWSTDOlkHxtsNo07DR5ux0qk/
14B3GuQSOw8M4IWvQr4K1x4bDXNTbXN+1mVapJfHJgCkJrBFJr8YgFNPN3KXtIfv
7IMsN3F69S4zL2+Hbu6WVfK7mgcZGFUoxiqOhm4now2LlDs8XNs55g==
=s3OM
-----END PGP SIGNATURE-----

[Index of Archives]     [Fedora Announce]     [Linux Crypto]     [Kernel]     [Netfilter]     [Bugtraq]     [USB]     [Fedora Security]

  Powered by Linux