5.1 Incident Response and Attack

Reusing Flash Drives: After the Trojan horse incident in Section 4.4.3, Bob decided to store working files on small, removable USB flash drives. At first he used the first drives he could find, and gave one copy to Tina. A few days later, he purchased two distinctive-looking drives. He carefully marked them to avoid confusing the confidential USB drives with others in the office.

After he copied all files to the new drives, he deleted the files from the old drives and “emptied the trash.”

A few days later, Eve visited Bob’s office. She asked Tina to lend her a spare USB drive. Should Tina give Eve one of the erased drives?

When we write information to a file, the file system copies that information onto ...

Get Elementary Information Security, 3rd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.