Студопедия — USB Flash Drives Revolutionize Portable Storage but Pose Security Risks for Organizations
Студопедия Главная Случайная страница Обратная связь

Разделы: Автомобили Астрономия Биология География Дом и сад Другие языки Другое Информатика История Культура Литература Логика Математика Медицина Металлургия Механика Образование Охрана труда Педагогика Политика Право Психология Религия Риторика Социология Спорт Строительство Технология Туризм Физика Философия Финансы Химия Черчение Экология Экономика Электроника

USB Flash Drives Revolutionize Portable Storage but Pose Security Risks for Organizations






Over the last few years USB Flash Drives have become a must-have item for computer users everywhere. We rely on them to transport all kinds of data including letters, spreadsheets, presentations, music and even movies. The capacity, physical size and speed of these drives has increased rapidly, and with that prices have come down making them an affordable accessory rather than luxury item. They have now completely replaced the humble Floppy Disk as the dominant format for re-writeable, portable storage, and rightfully so - Floppy Disks were well past their sell-by date at the turn of the 21st century.

But there are some risks associated with such a small device capable of storing vast amounts of data being kept in the pockets and on the key chains of millions of workers at companies/organizations across the world. Let’s take a look at some of these risks in detail.

The first risk is a loss of productivity; workers could use their USB Flash Drives to bring in software that is not suitable for the workplace, such as games or “joke” applications that could cause disruption. Employees could also use the fast internet access usually provided in the corporate network to download illegal or unsavoury material onto their USB Flash Drives that could damage the company’s reputation and potentially cause spyware or adware infections. The second risk is of workers bringing viruses, trojans, malware or adware into the workplace on USB Flash Drives. An example of this would be an employee with poor security on their home computer bringing a file he/she has been working on at home into the workplace on their USB Flash Drive and plugging it into a company machine. This could expose the corporate network to all kinds of viruses or malicious code that may have been transferred on the USB Flash Drive from an unprotected computer.
The third and most serious risk is the theft of confidential data or “data leakage” as it has come to be known. There have been many cases in the past where workers are given access to confidential information and abuse their position by copying sensitive data onto a USB Flash Drive. If this data is later leaked, it could cause embarrassment to the company involved with the possibility of negative press coverage, and they may even be subject to legal action. There is also the possibility of a USB Flash Drive containing confidential information being lost or misplaced by accident. A worst case scenario would be a USB Flash Drive dropping out of the pocket of a worker when out on their lunch break; this could mean a database with thousands of records of private information falling into the hands of unscrupulous people. There is now a solution to the problem of data leakage - a USB Flash Drive with strong 256-bit AES hardware-based. The SanDisk Cruzer Enterprise, available from Lucid IT Security, is the answer IT professionals needing to protect information on company-issued USB flash drives have been looking for. It is specifically designed to meet the unique USB security, compliance and manageability needs of enterprises. Rather than rely upon users to secure files, it imposes mandatory access control on all files, storing them in a hardware-encrypted, password-protected partition. The Cruzer Enterprise is also the first secure USB flash drive to fully support Apple Mac OS X computers, and can be initialized from either a Macintosh or a Windows computer. By supporting both Macintosh and Microsoft Windows environments, IT professionals can more effectively use SanDisk Cruzer Enterprise to protect information on company-issued secure USB flash drives across their organizations. Server-side software is also available to manage the Cruzer Enterprise drives-SanDisk CMC (Central Management and Control) adds a higher level of control to Cruzer Enterprise. It centrally manages the drive’s complete lifecycle, from initial user-deployment, through password administration and data backup, and finally to drive termination if lost or stolen.

(Alex Culshaw, http://www.articlesphere.com, January, 2009)

4.2. Indicate the paragraph that explains the advantages of USB Flash Drives and their popularity with computer users. Read this paragraph and define its main point. Summarize the paragraph in no more than two sentences. Begin with:

The article informs…

The article discusses/analyzes ….

The article raises up a question of…

4.3. Indicate the paragraphs that describe some of the risks associated with such small devices. Read them again and condense their content into 3 statements using the phrases:

The article also considers ….

Attention is given to ….

The article touches upon …..

Particular emphasis is placed on ….

4.4. Indicate the paragraphs where the solution to the problem of data leakage is suggested. Read these paragraphs and compress their content into statements using the phrases:

A solution to the problem of … is proposed.

Special emphasis is placed on…

The article is of (no) particular interest….

The article is of (no) professional interest, because….

4.5. Summarize the content of the article.

 

Text 5

5.1. Look at the title of the article and think what exactly it is going to be about. Check your guesses.

 

How to Really Trust a Mathematical Proof







Дата добавления: 2015-08-30; просмотров: 812. Нарушение авторских прав; Мы поможем в написании вашей работы!



Функция спроса населения на данный товар Функция спроса населения на данный товар: Qd=7-Р. Функция предложения: Qs= -5+2Р,где...

Аальтернативная стоимость. Кривая производственных возможностей В экономике Буридании есть 100 ед. труда с производительностью 4 м ткани или 2 кг мяса...

Вычисление основной дактилоскопической формулы Вычислением основной дактоформулы обычно занимается следователь. Для этого все десять пальцев разбиваются на пять пар...

Расчетные и графические задания Равновесный объем - это объем, определяемый равенством спроса и предложения...

Условия, необходимые для появления жизни История жизни и история Земли неотделимы друг от друга, так как именно в процессах развития нашей планеты как космического тела закладывались определенные физические и химические условия, необходимые для появления и развития жизни...

Метод архитекторов Этот метод является наиболее часто используемым и может применяться в трех модификациях: способ с двумя точками схода, способ с одной точкой схода, способ вертикальной плоскости и опущенного плана...

Примеры задач для самостоятельного решения. 1.Спрос и предложение на обеды в студенческой столовой описываются уравнениями: QD = 2400 – 100P; QS = 1000 + 250P   1.Спрос и предложение на обеды в студенческой столовой описываются уравнениями: QD = 2400 – 100P; QS = 1000 + 250P...

Тема: Изучение приспособленности организмов к среде обитания Цель:выяснить механизм образования приспособлений к среде обитания и их относительный характер, сделать вывод о том, что приспособленность – результат действия естественного отбора...

Тема: Изучение фенотипов местных сортов растений Цель: расширить знания о задачах современной селекции. Оборудование:пакетики семян различных сортов томатов...

Тема: Составление цепи питания Цель: расширить знания о биотических факторах среды. Оборудование:гербарные растения...

Studopedia.info - Студопедия - 2014-2024 год . (0.01 сек.) русская версия | украинская версия