2.6. Task 2.6: Securing Hardware Devices

One of the biggest challenges that a security administrator faces is that of users connecting devices to the systems you are hired to protect. These rogue devices, like USB thumb drives, can be used to introduce unlicensed software and malware onto the computer system, and to take sensitive information away from the office. These devices can be used as an attack vector by bad guys, causing backdoor or rootkit software to execute without the user's knowledge or desire.

The U3 system installed on USB thumb drives makes the USB drive appear to the operating system as a CD-ROM drive. The CD-ROM drive by default is configured to launch the autorun.ini script if the autorun.ini script is found in the root of ...

Get Security Administrator Street Smarts: A Real World Guide to CompTIA Security+™ Skills, Second Edition now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.