Difference between revisions of "USB Infection"

From BCMpedia. A Wiki Glossary for Business Continuity Management (BCM) and Disaster Recovery (DR).
Jump to navigation Jump to search
(Created page with "{| style="margin-left: 0px; text-align: left; font-style: none; width:100%; font-weight: none; background: #F0F0F0; border:1px" |- | '''1.''' Digital denizens are familiar wi...")
 
Line 1: Line 1:
 
{| style="margin-left: 0px; text-align: left; font-style: none; width:100%; font-weight: none; background: #F0F0F0; border:1px"
 
{| style="margin-left: 0px; text-align: left; font-style: none; width:100%; font-weight: none; background: #F0F0F0; border:1px"
 
|-
 
|-
| '''1.'''  Digital denizens are familiar with the USB flash drives given away at trade shows, conferences, information booths and the like. Some are even sent to recipients via snail mail, pre-loaded with useful marketing data and pre-configured to auto-link to websites upon initiation. These handy devices are ubiquitous among swag bag collectibles along with ink pens that don't work, stale mints and badge lanyards of all descriptions. However, unlike the other conference detritus, these drives can carry a dangerous payload.
+
| '''1.'''  [[Cyber_Criminal|Cyber criminals]] utilising portable media, a source of physical access, can bypass access controls by introducing toolkits that run directly from the device. Unsuspecting employees that are unaware of the dangers can also introduce [[Malware|malware]] into their work stations.
''' Source: '''(Verizon, 2016) <br> <br>
+
{{Bcm Institute Source}}
'''2.''' USB devices, and other portable media, represent a significant threat to organizational security. Threat actors with physical access can introduce toolkits, built to run directly from the USB device itself, to bypass access controls. Employees curious about content on USB devices can also introduce malware to their work systems. <br> '''Source:''' (Verizon, 2017)
 
  
 
|}
 
|}
Line 11: Line 10:
 
<br/> <br/> <br/> <br/> <br/> <br/> <br/> <br/> <br/> <br/> <br/> &nbsp;
 
<br/> <br/> <br/> <br/> <br/> <br/> <br/> <br/> <br/> <br/> <br/> &nbsp;
  
 
+
'''2.''' Digital denizens are familiar with the USB flash drives given away at trade shows, conferences, information booths and the like. Some are even sent to recipients via snail mail, pre-loaded with useful marketing data and pre-configured to auto-link to websites upon initiation. These handy devices are ubiquitous among swag bag collectibles along with ink pens that don't work, stale mints and badge lanyards of all descriptions. However, unlike the other conference detritus, these drives can carry a dangerous payload. <br/> '''Source:''' (Verizon, 2016) <br/>
 +
<br/>
 +
'''3.''' USB devices, and other portable media, represent a significant threat to organizational security. Threat actors with physical access can introduce toolkits, built to run directly from the USB device itself, to bypass access controls. Employees curious about content on USB devices can also introduce malware to their work systems. <br/> '''Source:''' (Verizon, 2017)
  
 
[[Category:BCM Institute Cyber Security Glossary]]
 
[[Category:BCM Institute Cyber Security Glossary]]

Revision as of 08:55, 24 August 2017

1. Cyber criminals utilising portable media, a source of physical access, can bypass access controls by introducing toolkits that run directly from the device. Unsuspecting employees that are unaware of the dangers can also introduce malware into their work stations.

(Source: Business Continuity Management Institute - BCM Institute)

A Manager's Guide to Business Continuity Management for Cyber Security Incident Response (2017) BUY!












 

2. Digital denizens are familiar with the USB flash drives given away at trade shows, conferences, information booths and the like. Some are even sent to recipients via snail mail, pre-loaded with useful marketing data and pre-configured to auto-link to websites upon initiation. These handy devices are ubiquitous among swag bag collectibles along with ink pens that don't work, stale mints and badge lanyards of all descriptions. However, unlike the other conference detritus, these drives can carry a dangerous payload.
Source: (Verizon, 2016)

3. USB devices, and other portable media, represent a significant threat to organizational security. Threat actors with physical access can introduce toolkits, built to run directly from the USB device itself, to bypass access controls. Employees curious about content on USB devices can also introduce malware to their work systems.
Source: (Verizon, 2017)