Task 2.6: Securing Hardware Devices
One of the biggest challenges that a security administrator faces is that of users connecting devices to the systems you are hired to protect. These rogue devices, such as USB thumb drives, can be used to introduce unlicensed software and malware onto the computer system and to take sensitive information away from the office. These devices can be used as an attack vector by bad guys, causing backdoor or rootkit software to execute without the user’s knowledge or desire.
The U3 system installed on USB thumb drives makes the USB drive appear to the operating system as a CD-ROM drive. The CD-ROM drive by default is configured to launch the autorun.ini script if the autorun.ini script is found in the root of the ...
Get Security Administrator Street Smarts: A Real World Guide to CompTIA Security+™ Skills, Third Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.