Security Threats and Mitigating Risk for USB Devices

被引:14
|
作者
Tetmeyer, Annette [1 ]
Saiedian, Hossein [2 ]
机构
[1] Univ Kansas, Dept Engn Management, Lawrence, KS 66049 USA
[2] Univ Kansas, Dept Elect Engn & Comp Sci, Lawrence, KS 66049 USA
关键词
D O I
10.1109/MTS.2010.939228
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Computer users have consistently sought out improvements to devices for removable storage to provide the quickest and most efficient means of transferring data from one computer to another. Cheap, convenient floppy disks with limited capacity gave way to optical discs, such as rewritable CDs, which significantly improved storage capacity. However, both floppy disks and CDs required the use of a drive in order to read and write to either and incompatibilities with both media were not uncommon. Email evolved as the next method for transfer of small or medium sized files. However, users still found the need for less cumbersome, higher-capacity portable media for the transfer of files. © 2006 IEEE.
引用
收藏
页码:44 / 49
页数:6
相关论文
共 50 条
  • [1] Mitigating Security Threats in Virtualized Environments
    Yauri, Bashir Aliyu
    Abah, Joshua
    [J]. International Journal of Computer Science and Network Security, 2016, 16 (01): : 101 - 108
  • [2] Mitigating Threats and Security Metrics in Cloud Computing
    Kar, Jayaprakash
    Mishra, Manoj Ranjan
    [J]. JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2016, 12 (02): : 226 - 233
  • [3] Mitigating Threats of Small Vessels to Maritime Security
    Trischitta, Patrick R.
    Salloum, Hady
    Bunin, Barry
    Orton, Philip
    [J]. 2012 IEEE INTERNATIONAL CONFERENCE ON TECHNOLOGIES FOR HOMELAND SECURITY, 2012, : 654 - 659
  • [4] The Ethics of Interaction: Mitigating Security Threats in LLMs
    School of Information, Rochester Institute of Technology, 1 Lomb Memorial Dr, Rochester
    NY
    14623, United States
    [J]. arXiv, 1600,
  • [5] Reducing the security risks of USB devices
    Allen, Rob
    [J]. Network Security, 2021, 2021 (09) : 17 - 19
  • [6] Mitigating IoT Security Threats with a Trusted Network Element
    Kuusijarvi, Jarkko
    Savola, Reijo
    Savolainen, Pekka
    Evesti, Antti
    [J]. 2016 11TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2016, : 260 - 265
  • [7] Security Issues and Threats of Mobile Devices
    Vorobyeva, Irina
    Cata, Teuta
    [J]. VISION 2020: INNOVATION, DEVELOPMENT SUSTAINABILITY, AND ECONOMIC GROWTH, VOLS 1-3, 2013, : 668 - 674
  • [8] Mitigating security threats and facilitating trade through the deployment of a global security network
    Jacquemard, Bruce
    [J]. Sharing the Gains of Globalization in the New Security Environment: The Challenges to Trade Facilitation, 2006, : 303 - 308
  • [9] Mitigating Security Threats Using Tactics and Patterns: A Controlled Experiment
    Pedraza-Garcia, Gilberto
    Noel, Rene
    Matalonga, Santiago
    Astudillo, Hernan
    Fernandez, Eduardo B.
    [J]. ACM PROCEEDINGS OF THE 10TH EUROPEAN CONFERENCE ON SOFTWARE ARCHITECTURE WORKSHOPS (ECSA-W), 2016,
  • [10] Modeling and Mitigating Security Threats in Network Functions Virtualization (NFV)
    Alhebaishi, Nawaf
    Wang, Lingyu
    Jajodia, Sushil
    [J]. DATA AND APPLICATIONS SECURITY AND PRIVACY XXXIV, DBSEC 2020, 2020, 12122 : 3 - 23