INTERNATIONAL SCIENTIFIC AND TECHNICAL CONFERENCE




Download 0.61 Mb.
Pdf ko'rish
bet3/4
Sana12.07.2023
Hajmi0.61 Mb.
#76651
1   2   3   4
Bog'liq
usb-security-and-mechanism-to-ensure-itc
Nano o’lchamli yupqa qatlamlarning tuzilishi va xossalari Shokir-fayllar.org, 4-tema, Топология локальной сети, Logoterapiya, Muloqatning ijtimoiy psixologik tavsifi va uning vazifalari, Chiziqli algebraik tenglamalar tizimini echish, 2 5357415121243080515, 63, bekzod, akhadbe kl
 
INTERNATIONAL SCIENTIFIC AND TECHNICAL CONFERENCE
“DIGITAL TECHNOLOGIES: PROBLEMS AND SOLUTIONS OF PRACTICAL 
IMPLEMENTATION IN THE SPHERES” 
APRIL 27-28, 2023 
538
Figure 8 
Figure 9 
CONCLUSION
The USB flash drive is currently the most popular mobile storage unit because of its many 
strengths including fast data transfer speed, high portability, and free transfer and deletion. 
However, serious problems have arisen, such as the inability to protect the internally stored data 
after the loss of a USB drive, leading to demands for the development of a secure USB flash drive 
featuring improved security functions. For that reason, new and more secure USB flash drives 
protect the internally stored data using such security technologies as data encryption/decryption 
and user authentication and identification. However, the problems of access to the inside of a drive 
and the leakage of data have been identified in secure USB flash drives installed with the latest 
security technologies due to such vulnerabilities as implementation and environmental 
vulnerabilities, unlock command, and reverse engineering. To solve such problems, this paper 
proposes a safe secure USB flash drive mechanism that does not expose the authentication data. 
The mechanism overcomes the existing vulnerabilities to protect the data more safely, since it does 
not store the data needed for user authentication and disk decryption inside the flash drive data and 
has no routine for comparing the authentication. To analyze the security of the proposed 
mechanism, the security requirements which the secure USB flash drive must satisfy and an attack 
technology scenario were deduced. The results of the security assessment confirmed that the 
proposed mechanism satisfies the confidentiality, integrity, authentication, and access control 
requirements and safely protects the data from impersonation, man-in-the-middle, resending, and 
eavesdropping attacks[2]. 
The following conclusions are also very important to us[1]: 
• 
Since the e-Mail messages are transferred in clear text, it is advisable to use some 
encryption software like PGP (pretty good privacy) to encrypt email messages before sending, so 
that it can be decrypted only by the specified recipient only. 
• 
Use Email filtering software to avoid Spam so that only messages from authorized 
users are received. Most e-Mail providers offer filtering services. 
• 
Do not open attachments coming from strangers, since they may contain a virus 
along with the received message. 
• 
Be careful while downloading attachments from e-Mails into your hard disk. Scan 
the attachment with updated antivirus software before saving it. 
• 
Do not send messages with attachments that contain executable code like Word 
documents with macros, .EXE files and ZIPPED files. We can use Rich Text Format instead of 
the standard .DOC format. RTF will keep your formatting, but will not include any macros. This 
may prevent you from sending virus to others if you are already infected by it. 



Download 0.61 Mb.
1   2   3   4




Download 0.61 Mb.
Pdf ko'rish

Bosh sahifa
Aloqalar

    Bosh sahifa



INTERNATIONAL SCIENTIFIC AND TECHNICAL CONFERENCE

Download 0.61 Mb.
Pdf ko'rish