0
2.6kviews
Unconventional/Stealth Storage Devices
1 Answer
0
104views

We would like to emphasize upon widening the spectrum of mobile devices and focus on secondary storage devices, such as compact disks (CDs) and Universal Serial Bus (USB) drives (also called zip drive, memory sticks) used by employees. As the technology is advancing, the devices continue to decrease in size and emerge in new shapes and sizes - unconventional/stealth storage devices available nowadays are difficult to detect and have become a prime challenge for organizational security. It is advisable to prohibit the employees in using these devices.

Firewalls and antivirus software are no defense against the threat of open USB ports. Not only can viruses, worms and Trojans get into the organization network, but can also destroy valuable data in the organization network. Organization has to have a policy in place to block these ports while issuing the asset to the employee. However, sometimes the standard access controls with Windows OS do not allow the assignment of permissions for USB ports and restricting these devices becomes next to impossible. Disgruntled employees can connect a USB/small digital camera/MP3 player to the USB port of any unattended computer and will be able to download confidential data or upload harmful viruses. As the malicious attack is launched from within the organization, firewalls and antivirus software are not alerted.

Using "DeviceLock" software solution, one can have control over unauthorized access to plug and play play devices.The features of the software allows system administrator to:

  1. Monitor which users or groups can access USB Ports, Wi-Fi and Bluetooth adapters, CD read-only memories (CD-ROMs) and other removable devices.
  2. Control the access to devices depending on the time of the day and day of the week.
  3. Create the white list of USB devices which allows you to authorize only specific devices that will not be locked regardless of any other settings.
  4. Set devices in read-only mode.
  5. Protect disks from accidental or intentional formatting.
Please log in to add an answer.