SlideShare a Scribd company logo
1 of 1
Download to read offline
Controlling USB Drives
                                     And Other Removable Media


Recent news of the Stuxnet Trojan attacking Siemens systems used to control critical infrastructure and
industrial plants reminds of the necessity to control the use of USB drives and other removable media
or be prepared to accept a continuing stream of malware infections. Fortunately for users of Naknan's
Security Assistant, we've got you covered.

Security Assistant detects the insertion of USB drives and CD-ROM/DVD, as well as plug-in
removable media. Upon detection, Security Assistant immediately sends an alert to the Management
Console but does nothing else unless something on the media attempts to execute or move to the
computer. This could be a worm, Trojan, or other malicious software exploiting Microsoft's autoplay
feature, or it could be the computer user attempting to install or execute unauthorized software, such as
LimeWire. When software attempts to execute from removable media, Security Assistant intervenes
until it determines whether the software is authorized to execute from that location. If not, execution is
blocked and the software is quarantined (it disappears from the media) unless it is write-protected. If
the software is attempting to move from removable media to the computer, like a drag-and-drop or
other file copy, the software is checked to determine whether it is authorized to exist on the computer.
If not, the file copy that moved to the computer is quarantined but the source copy is ignored. In all
cases, alerts to the Security Assistant Management Console let the Security Assistant operator know
what is happening.

Security Assistant monitors only the movement or execution of software, not data files. So, any data
file, such as a Word document or Excel spreadsheet, can be opened without interference.

At present, any file can be written to the USB drive, since doing so does not present a software-based
security threat. For customers who wish to disable the ability to write to writable removable media,
Security Assistant provides that capability. For USB drives, this is easy, quick, and reliable. For
preventing writes to CD/DVD, it can be less straightforward when third party DVD burning software is
installed on the computer. It can still be done, it just requires a couple more steps to remove the third
party “burn” capability from the computer's whitelist.

It is possible to provide more options with respect to removable media, and some of those will be
coming in the first half of 2011. It's important to remember that we don't rename the USB driver, which
prevents everyone from using the USB ports (maintenance techs wouldn't like that, since they often
carry several tools on USB drives). USB drives are great conveniences, but if you're going to be secure,
you must control them; Security Assistant can give you that control.


Naknan, Inc.                                  281-990-0030                              www.naknan.com

More Related Content

What's hot

How to set your windows updates and firewall
How to set your windows updates and firewallHow to set your windows updates and firewall
How to set your windows updates and firewallchuckthomassql
 
maintaning your computer systems
maintaning your computer systemsmaintaning your computer systems
maintaning your computer systemsGener Luis Morada
 
How safe is your computer?
How safe is your computer?How safe is your computer?
How safe is your computer?Sunjoonah Kambbs
 
Anthony Merseal - Steps to Keep Your Computer Virus Free
Anthony Merseal - Steps to Keep Your Computer Virus Free Anthony Merseal - Steps to Keep Your Computer Virus Free
Anthony Merseal - Steps to Keep Your Computer Virus Free Anthony Merseal
 
Safe computing (circa 2004)
Safe computing (circa 2004)Safe computing (circa 2004)
Safe computing (circa 2004)Azmi Mohd Tamil
 
Safe computing (Tips & Tricks)
Safe computing (Tips & Tricks)Safe computing (Tips & Tricks)
Safe computing (Tips & Tricks)Satyendra Arora
 
Pc Preventative Maintenance Checklist
Pc Preventative Maintenance ChecklistPc Preventative Maintenance Checklist
Pc Preventative Maintenance ChecklistMiss Cheska
 
Troubleshooting Fundamentals
Troubleshooting FundamentalsTroubleshooting Fundamentals
Troubleshooting Fundamentalsisma ishak
 
Personal firewall,Ad Wares,Spy wares,Viruses,Anti Viruses
Personal firewall,Ad Wares,Spy wares,Viruses,Anti VirusesPersonal firewall,Ad Wares,Spy wares,Viruses,Anti Viruses
Personal firewall,Ad Wares,Spy wares,Viruses,Anti VirusesAdeel Khurram
 
'We Eat Cryptolocker for Breakfast' - How to Beat Ransomware Presentation
'We Eat Cryptolocker for Breakfast' - How to Beat Ransomware Presentation'We Eat Cryptolocker for Breakfast' - How to Beat Ransomware Presentation
'We Eat Cryptolocker for Breakfast' - How to Beat Ransomware PresentationLucy Denver
 
IT Security Basics For Managers
IT Security Basics For ManagersIT Security Basics For Managers
IT Security Basics For ManagersDaniel Owens
 
enSilo-in-a-Nutshell
enSilo-in-a-NutshellenSilo-in-a-Nutshell
enSilo-in-a-NutshellDan Kunkel
 
Data protection
Data protectionData protection
Data protectionnity
 

What's hot (17)

Pcmaintenance2
Pcmaintenance2Pcmaintenance2
Pcmaintenance2
 
How to set your windows updates and firewall
How to set your windows updates and firewallHow to set your windows updates and firewall
How to set your windows updates and firewall
 
maintaning your computer systems
maintaning your computer systemsmaintaning your computer systems
maintaning your computer systems
 
Troubleshooting
TroubleshootingTroubleshooting
Troubleshooting
 
License
LicenseLicense
License
 
How safe is your computer?
How safe is your computer?How safe is your computer?
How safe is your computer?
 
Anthony Merseal - Steps to Keep Your Computer Virus Free
Anthony Merseal - Steps to Keep Your Computer Virus Free Anthony Merseal - Steps to Keep Your Computer Virus Free
Anthony Merseal - Steps to Keep Your Computer Virus Free
 
Safe computing (circa 2004)
Safe computing (circa 2004)Safe computing (circa 2004)
Safe computing (circa 2004)
 
Safe computing (Tips & Tricks)
Safe computing (Tips & Tricks)Safe computing (Tips & Tricks)
Safe computing (Tips & Tricks)
 
Pc Preventative Maintenance Checklist
Pc Preventative Maintenance ChecklistPc Preventative Maintenance Checklist
Pc Preventative Maintenance Checklist
 
Troubleshooting Fundamentals
Troubleshooting FundamentalsTroubleshooting Fundamentals
Troubleshooting Fundamentals
 
Basic Operating System
Basic Operating SystemBasic Operating System
Basic Operating System
 
Personal firewall,Ad Wares,Spy wares,Viruses,Anti Viruses
Personal firewall,Ad Wares,Spy wares,Viruses,Anti VirusesPersonal firewall,Ad Wares,Spy wares,Viruses,Anti Viruses
Personal firewall,Ad Wares,Spy wares,Viruses,Anti Viruses
 
'We Eat Cryptolocker for Breakfast' - How to Beat Ransomware Presentation
'We Eat Cryptolocker for Breakfast' - How to Beat Ransomware Presentation'We Eat Cryptolocker for Breakfast' - How to Beat Ransomware Presentation
'We Eat Cryptolocker for Breakfast' - How to Beat Ransomware Presentation
 
IT Security Basics For Managers
IT Security Basics For ManagersIT Security Basics For Managers
IT Security Basics For Managers
 
enSilo-in-a-Nutshell
enSilo-in-a-NutshellenSilo-in-a-Nutshell
enSilo-in-a-Nutshell
 
Data protection
Data protectionData protection
Data protection
 

Viewers also liked (20)

10 comportamientos digitales
10 comportamientos digitales10 comportamientos digitales
10 comportamientos digitales
 
Orwell revolutionary act
Orwell revolutionary actOrwell revolutionary act
Orwell revolutionary act
 
ההתנחלות עפרה - מאחז בלתי-מורשה
ההתנחלות עפרה - מאחז בלתי-מורשהההתנחלות עפרה - מאחז בלתי-מורשה
ההתנחלות עפרה - מאחז בלתי-מורשה
 
Tracks signatory com
Tracks signatory  comTracks signatory  com
Tracks signatory com
 
Service foam
Service foamService foam
Service foam
 
Social work ari
Social work ariSocial work ari
Social work ari
 
Ghostbusters challenge
Ghostbusters challengeGhostbusters challenge
Ghostbusters challenge
 
งาน อ.ป
งาน อ.ป งาน อ.ป
งาน อ.ป
 
Los 10 comporamientos digitales
Los 10 comporamientos digitales Los 10 comporamientos digitales
Los 10 comporamientos digitales
 
Bases premio Jaén Selección 2015
Bases premio Jaén Selección 2015Bases premio Jaén Selección 2015
Bases premio Jaén Selección 2015
 
El amor
El amorEl amor
El amor
 
Esci 1101 spring_2011_ch06_power_point
Esci 1101 spring_2011_ch06_power_pointEsci 1101 spring_2011_ch06_power_point
Esci 1101 spring_2011_ch06_power_point
 
Interview met Diana Koster in VOG magazine
Interview met Diana Koster in VOG magazineInterview met Diana Koster in VOG magazine
Interview met Diana Koster in VOG magazine
 
Como Hacerlo
Como HacerloComo Hacerlo
Como Hacerlo
 
Carla 1.C presentacion
Carla 1.C presentacionCarla 1.C presentacion
Carla 1.C presentacion
 
B a l i r27 malang1
B a l i r27 malang1B a l i r27 malang1
B a l i r27 malang1
 
De zomer-is-weer-in-aantocht
De zomer-is-weer-in-aantochtDe zomer-is-weer-in-aantocht
De zomer-is-weer-in-aantocht
 
Relaciones binarias
Relaciones binariasRelaciones binarias
Relaciones binarias
 
Alimentação saudável
Alimentação saudávelAlimentação saudável
Alimentação saudável
 
知雨霖—课件开发工具WE
知雨霖—课件开发工具WE知雨霖—课件开发工具WE
知雨霖—课件开发工具WE
 

Similar to Usb Control

Unit III - Basics of Computer Science
Unit III - Basics of Computer ScienceUnit III - Basics of Computer Science
Unit III - Basics of Computer ScienceHepsijeba
 
Portable storage device management
Portable storage device managementPortable storage device management
Portable storage device managementcseij
 
GUIDE HARDWARE AND SOFTWARE MAINTENANCE English
GUIDE HARDWARE AND SOFTWARE MAINTENANCE EnglishGUIDE HARDWARE AND SOFTWARE MAINTENANCE English
GUIDE HARDWARE AND SOFTWARE MAINTENANCE EnglishFelipe Luis Garcia C
 
As media studies software and systems presentation
As media studies software and systems presentationAs media studies software and systems presentation
As media studies software and systems presentationpaddy249
 
Basic computer tutorial
Basic computer tutorialBasic computer tutorial
Basic computer tutorialSayeedAsghar
 
As a system administrator who is responsible for your company-'s netwo.docx
As a system administrator who is responsible for your company-'s netwo.docxAs a system administrator who is responsible for your company-'s netwo.docx
As a system administrator who is responsible for your company-'s netwo.docxbickerstaffinell
 
unistal in-Protegent Security - Home Business 1
unistal in-Protegent Security - Home  Business 1unistal in-Protegent Security - Home  Business 1
unistal in-Protegent Security - Home Business 1Vijay Kumar
 

Similar to Usb Control (20)

Unit III - Basics of Computer Science
Unit III - Basics of Computer ScienceUnit III - Basics of Computer Science
Unit III - Basics of Computer Science
 
Read me!
Read me!Read me!
Read me!
 
Day1 ubuntu boot camp
Day1   ubuntu boot campDay1   ubuntu boot camp
Day1 ubuntu boot camp
 
Portable storage device management
Portable storage device managementPortable storage device management
Portable storage device management
 
GUIDE HARDWARE AND SOFTWARE MAINTENANCE English
GUIDE HARDWARE AND SOFTWARE MAINTENANCE EnglishGUIDE HARDWARE AND SOFTWARE MAINTENANCE English
GUIDE HARDWARE AND SOFTWARE MAINTENANCE English
 
Manual en ingles
Manual en  inglesManual en  ingles
Manual en ingles
 
Manual en ingles
Manual en  inglesManual en  ingles
Manual en ingles
 
Manual en ingles
Manual en  inglesManual en  ingles
Manual en ingles
 
As media studies software and systems presentation
As media studies software and systems presentationAs media studies software and systems presentation
As media studies software and systems presentation
 
Basic computer tutorial
Basic computer tutorialBasic computer tutorial
Basic computer tutorial
 
unit5final
unit5finalunit5final
unit5final
 
system Security
system Security system Security
system Security
 
As a system administrator who is responsible for your company-'s netwo.docx
As a system administrator who is responsible for your company-'s netwo.docxAs a system administrator who is responsible for your company-'s netwo.docx
As a system administrator who is responsible for your company-'s netwo.docx
 
p3 unit 2
p3 unit 2p3 unit 2
p3 unit 2
 
Web server security techniques by Khawar Nehal
Web server security techniques by Khawar NehalWeb server security techniques by Khawar Nehal
Web server security techniques by Khawar Nehal
 
unistal in-Protegent Security - Home Business 1
unistal in-Protegent Security - Home  Business 1unistal in-Protegent Security - Home  Business 1
unistal in-Protegent Security - Home Business 1
 
BH SA A4 Brochure
BH SA A4 BrochureBH SA A4 Brochure
BH SA A4 Brochure
 
UK Gov Report Summary
UK Gov Report SummaryUK Gov Report Summary
UK Gov Report Summary
 
Deft v7
Deft v7Deft v7
Deft v7
 
usb-lock-rp-en
usb-lock-rp-enusb-lock-rp-en
usb-lock-rp-en
 

Usb Control

  • 1. Controlling USB Drives And Other Removable Media Recent news of the Stuxnet Trojan attacking Siemens systems used to control critical infrastructure and industrial plants reminds of the necessity to control the use of USB drives and other removable media or be prepared to accept a continuing stream of malware infections. Fortunately for users of Naknan's Security Assistant, we've got you covered. Security Assistant detects the insertion of USB drives and CD-ROM/DVD, as well as plug-in removable media. Upon detection, Security Assistant immediately sends an alert to the Management Console but does nothing else unless something on the media attempts to execute or move to the computer. This could be a worm, Trojan, or other malicious software exploiting Microsoft's autoplay feature, or it could be the computer user attempting to install or execute unauthorized software, such as LimeWire. When software attempts to execute from removable media, Security Assistant intervenes until it determines whether the software is authorized to execute from that location. If not, execution is blocked and the software is quarantined (it disappears from the media) unless it is write-protected. If the software is attempting to move from removable media to the computer, like a drag-and-drop or other file copy, the software is checked to determine whether it is authorized to exist on the computer. If not, the file copy that moved to the computer is quarantined but the source copy is ignored. In all cases, alerts to the Security Assistant Management Console let the Security Assistant operator know what is happening. Security Assistant monitors only the movement or execution of software, not data files. So, any data file, such as a Word document or Excel spreadsheet, can be opened without interference. At present, any file can be written to the USB drive, since doing so does not present a software-based security threat. For customers who wish to disable the ability to write to writable removable media, Security Assistant provides that capability. For USB drives, this is easy, quick, and reliable. For preventing writes to CD/DVD, it can be less straightforward when third party DVD burning software is installed on the computer. It can still be done, it just requires a couple more steps to remove the third party “burn” capability from the computer's whitelist. It is possible to provide more options with respect to removable media, and some of those will be coming in the first half of 2011. It's important to remember that we don't rename the USB driver, which prevents everyone from using the USB ports (maintenance techs wouldn't like that, since they often carry several tools on USB drives). USB drives are great conveniences, but if you're going to be secure, you must control them; Security Assistant can give you that control. Naknan, Inc. 281-990-0030 www.naknan.com