USB Drives: Friend or Foe?: New User Trends and Exploits in USB Requires Security Controls to Protect Endpoints and the Networked Enterprise

Free registration required

Executive Summary

This whitepaper describes how security professionals can reduce risks of vulnerabilities to portable applications and USB storage. It surveys the current state of USB storage and explains architectural background on the operation of portable applications. The paper also provides several examples of attacks using USB drives that exploit endpoints. It concludes by noting how Check Point Endpoint Security can block risks to an enterprise such as information leakage and attacks using USB and portable applications.

  • Format: PDF
  • Size: 788.34 KB