-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Cyber Security Tip ST08-001 Using Caution with USB Drives USB drives are popular for storing and transporting data, but some of the characteristics that make them convenient also introduce security risks. What security risks are associated with USB drives? Because USB drives, sometimes known as thumb drives, are small, readily available, inexpensive, and extremely portable, they are popular for storing and transporting files from one computer to another. However, these same characteristics make them appealing to attackers. One option is for attackers to use your USB drive to infect other computers. An attacker might infect a computer with malicious code, or malware, that can detect when a USB drive is plugged into a computer. The malware then downloads malicious code onto the drive. When the USB drive is plugged into another computer, the malware infects that computer. Some attackers have also targeted electronic devices directly, infecting items such as electronic picture frames and USB drives during production. When users buy the infected products and plug them into their computers, malware is installed on their computers. Attackers may also use their USB drives to steal information directly from a computer. If an attacker can physically access a computer, he or she can download sensitive information directly onto a USB drive. Even computers that have been turned off may be vulnerable, because a computer's memory is still active for several minutes without power. If an attacker can plug a USB drive into the computer during that time, he or she can quickly reboot the system from the USB drive and copy the computer's memory, including passwords, encryption keys, and other sensitive data, onto the drive. Victims may not even realize that their computers were attacked. The most obvious security risk for USB drives, though, is that they are easily lost or stolen (see Protecting Portable Devices: Physical Security for more information). If the data was not backed up, the loss of a USB drive can mean hours of lost work and the potential that the information cannot be replicated. And if the information on the drive is not encrypted, anyone who has the USB drive can access all of the data on it. How can you protect your data? There are steps you can take to protect the data on your USB drive and on any computer that you might plug the drive into: * Take advantage of security features - Use passwords and encryption on your USB drive to protect your data, and make sure that you have the information backed up in case your drive is lost (see Protecting Portable Devices: Data Security for more information). * Keep personal and business USB drives separate - Do not use personal USB drives on computers owned by your organization, and do not plug USB drives containing corporate information into your personal computer. * Use and maintain security software, and keep all software up to date - Use a firewall, anti-virus software, and anti-spyware software to make your computer less vulnerable to attacks, and make sure to keep the virus definitions current (see Understanding Firewalls, Understanding Anti-Virus Software, and Recognizing and Avoiding Spyware for more information). Also, keep the software on your computer up to date by applying any necessary patches (see Understanding Patches for more information). * Do not plug an unknown USB drive into your computer - If you find a USB drive, give it to the appropriate authorities (a location's security personnel, your organization's IT department, etc.). Do not plug it into your computer to view the contents or to try to identify the owner. _________________________________________________________________ Author: Mindi McDowell _________________________________________________________________ Produced 2008 by US-CERT, a government organization. Note: This tip was previously published and is being re-distributed to increase awareness. Terms of use <http://www.us-cert.gov/legal.html> This document can also be found at <http://www.us-cert.gov/cas/tips/ST08-001.html> For instructions on subscribing to or unsubscribing from this mailing list, visit <http://www.us-cert.gov/cas/signup.html>. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.5 (GNU/Linux) iQEVAwUBSRCZy3IHljM+H4irAQIZkggAsxbz6lGzZJOV0mU8oJZAxQHcmqS3BNAd ex/leZ58kfUbfMn1Hvcivkt4PXP6koMTleHravZb0lXFjuoxpm/ROckZAtKsO3ow AaDkZuIOGdw+pKt5fc4if/oKv2XfWWgwcCXcxX9t7vd3dThpOpsnNo549qY5JSzG dDMruMk842tpq99/+TgN0tQ49ES+cU7V4Kssz4uAWSTDOlkHxtsNo07DR5ux0qk/ 14B3GuQSOw8M4IWvQr4K1x4bDXNTbXN+1mVapJfHJgCkJrBFJr8YgFNPN3KXtIfv 7IMsN3F69S4zL2+Hbu6WVfK7mgcZGFUoxiqOhm4now2LlDs8XNs55g== =s3OM -----END PGP SIGNATURE-----