The National Institute of Standards and Technology's own policies and technical requirements on USB thumb drive security furnish other federal agencies with a de facto set of best practices. For one thing, officials at NIST, part of the Commerce Department and the federal government's lead agency on establishing information security standards, don't see the point in banning the use of storage devices such as thumb drives, despite the risks. On the contrary, they find them practical and useful for NIST's employees, many of whom are computer scientists, physicists and engineers.
This policy establishes safeguards for using removable media in conjunction with Delta State University computing resources and data. Appropriate security of all removable media, whether owned by Delta State University or by individuals, is required to prevent the spread of viruses, the loss or compromise of sensitive data, and other risks to the DSU network. Removable Media: Removable Media may be defined as any of the following.
From the Reuters news agency on Saturday:. Reuters — The Pentagon has granted many exceptions, possibly numbering in the thousands, to allow staff members who administer secure computer networks to use flash drives and other portable storage devices, department spokesmen say. Despite a number of leaks already flowing out of the U.
Joinsubscribers and get a daily digest of news, geek trivia, and our feature articles. Each individual storage device has its own specific policy setting so that you can select different policies for different devices. Whenever you write to the drive, Windows writes the data to the drive as quickly as possible.
For such a small device, the plastic, handheld USB flash drive can cause big security headaches. Even if you have robust end-point security and establish rigid policies about employee use of these drives, employees still find a way to copy financial reports and business plans for use at home. While other security breaches are more traceable, a flash drive is more difficult to monitor, especially after the employee leaves work.
USB drives present one of the most well-known, but least mitigated security threats in every day business and government operations. Sort of like driving without a seat belt. The cyber threat from USB drives is multi-dimensional.
Businesses still use USB drives and other portable data devices for a number of their core operations. These continue to be the potential source of a major security breach, as the security company ESET discovered when they asked dry cleaners across the UK how many USB drives they find. On average they found four USB drives, which of course could all have contained highly sensitive information.
When connecting a new USB device to the computer, Windows automatically detects the device and installs an appropriate driver, which means that the user can almost immediately use a connected USB drive or device. In some organizations, the use of USB-devices flash drives, USB HDDs, SD cards and so on is blocked for security reasons to prevent security leakage of confidential data and the penetration of viruses into the internal corporate network. You can programmatically block the use of USB drives, without affecting such USB devices as a mouse, keyboard, printer, etc. The USB device blocking policy will work if the infrastructure of your AD domain meets the following requirements:.