+ All Categories
Home > Documents > pod slurping the threat of portable

pod slurping the threat of portable

Date post: 14-Apr-2018
Category:
Upload: riteshchanana
View: 221 times
Download: 0 times
Share this document with a friend

of 29

Transcript
  • 7/27/2019 pod slurping the threat of portable

    1/29

    Pod slurping and other security risks through the

    uncontrolled use of iPods, USB sticks and other devices

  • 7/27/2019 pod slurping the threat of portable

    2/29

    Overview

    Portable devices

    The threat of portable devices

    GFI EndPointSecurity

    Benefits of GFI EndPointSecurity

    Wrap-up

  • 7/27/2019 pod slurping the threat of portable

    3/29

    Market trends for 2006 (1/2)

    42 million Combined sales of PDAs and Smart phones

    Gartner Group

    30 million Digital cameras sold in the USA

    IDC

    88 millionApple iPods sold worldwide (2002 Q1 2007 Q1) Wikipedia, based on Apples quarterly financial results

    8.1 millionApple iPods sold during 2006 Q2

    The Register

  • 7/27/2019 pod slurping the threat of portable

    4/29

    Market trends for 2006 (2/2)

    25% Shipments rise in Q4 Smart phones

    ZDNet Research

    18% Shipments rise Personal Digital Assistants (PDA)

    Gartner Group

    22% Market growth Mobile phones IDC

    22% Market growth Bluetooth-enabled Mobile phones

    The NPD Group

  • 7/27/2019 pod slurping the threat of portable

    5/29

    Attracting customers

    T-Mobile Free mobile phone on service activation

    Microsoft Educational material on USB flash drives

    EBay Free iPods on referral of users

    Consumer Help Incentive Promotions Test and keep!

  • 7/27/2019 pod slurping the threat of portable

    6/29

    Market predictions (1/2)

    56% Handsets will have Bluetooth by 2008

    In-Stat

    75% Mobile phones sold in 2010 will have a removable memory card

    Strategy Analytics

    53% Rise in demand for memory cards by 2010 Strategy Analytics

    25% Smart phones of the overall global mobile telephony market by 2009

    In-Stat

    http://images.google.com.mt/imgres?imgurl=http://www.digitalhome.com.au/images/store/06042003861e5b_400x332.jpg&imgrefurl=http://www.digitalhome.com.au/Digital_Cameras_And_Printers/Accessories/Memory_Cards_And_Digital_Media/Kingston_Technology/SD_(Secure_Digital)_Memory_Card,_1GB/949%3Fprint%3D1&h=332&w=400&sz=213&hl=en&start=12&tbnid=MOfP6F79dbHXQM:&tbnh=103&tbnw=124&prev=/images%3Fq%3D%252B%2522mobile%2Bphone%2522%2B%252B%2522memory%2Bcard%2522%26gbv%3D2%26svnum%3D100%26hl%3Den
  • 7/27/2019 pod slurping the threat of portable

    7/29

    Market predictions (2/2)

    340 million USB flash drives to be sold in 2008

    Web-Feet Research

    583 million Bluetooth phones to be sold in 2009

    Gartner Research

    764 million Mobile phones will support USB in 2010 iSuppli

    290 million Smart phones to be sold by 2008

    Zelos Group

  • 7/27/2019 pod slurping the threat of portable

    8/29

    Electronic devices

    Part of everyones lifestyle (e.g. Camera phones)

    Fashionable (e.g. PDAs, iPods) colors

    Convenient (e.g. Portable storage devices)

    Small, smaller and even smaller (e.g. USB Memory sticks)

  • 7/27/2019 pod slurping the threat of portable

    9/29

    Characteristics of portable devices

    Highly portable

    High storage audio/photos/videos etc

    Easy to connect

    Fast data transfers

    Expansion slots

    Affordable

    Accessible

  • 7/27/2019 pod slurping the threat of portable

    10/29

    Security

    Information

    theft

    Legal

    compliance

    Production

    loss

    Threats and areas of concern

    Information theft

    Security

    Production Loss

    Legal Compliance

    http://kens411.blogs.com/.shared/image.html?/photos/uncategorized/secretagent.jpg
  • 7/27/2019 pod slurping the threat of portable

    11/29

    Threats and areas of concern Information theft

    Intellectual property

    Delivery schedules

    Proposals

    Price lists

    Tenders

  • 7/27/2019 pod slurping the threat of portable

    12/29

    Threats and areas of concern Security

    Viruses

    Trojans

    Worms

    Spyware

    Adware

  • 7/27/2019 pod slurping the threat of portable

    13/29

    Threats and areas of concern Productivity loss

    Personal downloads

    Computer gaming

    Photo editing

    Part-time work

    And more

  • 7/27/2019 pod slurping the threat of portable

    14/29

    Threats and areas of concern Legal compliance

    Confidentiality

    Licenses

    Piracy

    Pornography

    And more

  • 7/27/2019 pod slurping the threat of portable

    15/29

    Evil in disguise The iPod

    30 to 60GB storage space

    > 15,000 songs

    > 25,000 photos

    > 150 hours of video

    Physically small

    Fast data transfer

    Up to 20 hours of battery life

    Works with Windows 2000/XP

  • 7/27/2019 pod slurping the threat of portable

    16/29

    iPod ShuffleiPod iPod Nano

    Various Shapes, colors and sizes

  • 7/27/2019 pod slurping the threat of portable

    17/29

    Evil exposed Pod Slurping

    Slurp.exe is freeware

    Runs directly from iPod

    Copies files automatically

    Transfers 100MB in two minutes

  • 7/27/2019 pod slurping the threat of portable

    18/29

    Data theft uncontrolled environment

    Waits until clear

    Walks unattended workstations

    Plugs in iPod

    Slurps information

    Acquires information

  • 7/27/2019 pod slurping the threat of portable

    19/29

    Typical methods to control the dangers

    Ban devices in your company

    Block drives on every computer

    Block connection ports on every computer

    Physically monitor connections

  • 7/27/2019 pod slurping the threat of portable

    20/29

    Regain control with GFI EndPointSecurity

    Network-wide control of portable storage media and consumer electronic

    devices

    Centrally manage user access to:

    Media players, including iPods, Creative Zen and others

    USB sticks, CompactFlash, memory cards, CDs, floppies and other

    portable storage devices PDAs, Blackberry handhelds, mobile phones and similar

    communication devices

    Network cards, laptops and other network connections

  • 7/27/2019 pod slurping the threat of portable

    21/29

    Top features

    Granular user access control, through the use of read only and read/write

    permissions on a device by device and user by user basis

    Automated client-side agent deployment

    Group-based protection control

    Log device-related user activity

  • 7/27/2019 pod slurping the threat of portable

    22/29

    Whats new in v. 3?

    Added support for more devices (including wireless NIC cards, Palm/PDA

    devices, printers, modems, digital cameras, scanners and more)

    Logging of the content transfer activity performed to and from portable

    devices

    Group-based control protection; used to set different protection levels to

    different computers/users without losing track of how each computer is

    protected

    Granular access control, through the use of read only and read/write

    permissions on a device by device basis

  • 7/27/2019 pod slurping the threat of portable

    23/29

    GFI EndPointSecurity Management Console

    Product snapshot

  • 7/27/2019 pod slurping the threat of portable

    24/29

    GFI EndPointSecurity

    configuration options

    GFI EndPointSecurity Management Console

    Product snapshot

  • 7/27/2019 pod slurping the threat of portable

    25/29

    Device access statistics

    GFI EndPointSecurity monitors and

    controls device usage

    Product snapshot

  • 7/27/2019 pod slurping the threat of portable

    26/29

    Product benefits

    Blocks insider data theft by fully controlling access to portable storage

    devices

    Prevents users from introducing viruses and unauthorized software into

    the corporate network

    Allows administrators to exercise group-based control over a wide array

    of portable devices without affecting authorized users

    Prevents productivity loss by blocking unauthorized uploads of games

    and other personal files from portable storage devices

    Ships with three protection policies: for laptops, workstations and servers

  • 7/27/2019 pod slurping the threat of portable

    27/29

    ROI

    Technological barrier against portable media devices

    Controls content transfer and protects intellectual property

    Prevents productivity loss

    Supports legal compliance

    Exercises control without affecting authorized users

  • 7/27/2019 pod slurping the threat of portable

    28/29

    Wrap-up

    2005 market trends

    Attracting customers

    Market predictions

    Characteristics of portable devices

    GFI EndPointSecurity as a method to control the dangers

  • 7/27/2019 pod slurping the threat of portable

    29/29

    Corporate overview

    Founded in 1992

    Over 200 employees worldwide

    Offices in Malta, London, Raleigh, Hong

    Kong and Adelaide

    GFI products installed on over 200,000

    networks worldwide, mostly SMBs

    A channel-focused company with over

    10,000 partners throughout the world

    The visionTo become the technology of

    choice for IT security and

    productivity solutions.

    The mission

    To provide quality, cost-

    effective content security,network security and

    messaging solutions to IT

    professionals around the

    world.

    http://www.gfi.com/news/en/MSD2Dpeopleschoiceaward.htmhttp://www.gfi.com/news/en/w2knewstargetwin.htmhttp://www.gfi.com/news/en/marreaderschoice.htmhttp://www.gfi.com/news/en/lanssreaderschoice04.htmhttp://www.msexchange.org/tutorials/Software-Review-GFI-MailArchiver.html

Recommended