March 2019 AST Magazine March 2019 AST Magazine | Page 30
No
software vulnerability eliminates the these are not secure
solutions
that meet
www.AmericanSecurityToday.com
March
2019 - Edition
33
possibility of brute-force, sniffing, and the requirements of government data
memory hash attacks.
protection.
Protect Against BadUSB
Encrypted drives
have
digitally
signed firmware
that cannot be al-
tered as well as a
physical layer of
protection (this is
usually known as
protection against
BadUSB).
The top-of-the-line hardware-based
encrypted USB drives, such as the
Kingston IronKey solutions, use
AES 256-bit encryption in XTS mode
and are FIPS 140-2 Level 3 certified .
This helps safeguard that anyone who
finds such a drive - cannot access
the information.
They also provide brute-force protec-
tion as the drive wipes itself clean
after 10 attempts of incorrect pass-
Some of these drives not only come word guessing.
epoxy-dipped, but are epoxy-filled So, while the drive and its contents are
so the casing adds an additional lay- lost, there can be peace of mind that
er of physical security to prevent ac- no one else will have the information.
cess to the physical memory.
In contrast, a USB drive with soft-
ware-based encryption uses software
that runs on the host computer and is
vulnerable to attacks, and typically
does not include the physical layer
of security.
A hardware-centric/software-free en-
cryption approach to data security is
the best defense against data loss, as it
eliminates the most commonly used at-
tack routes.
This same software-free method also pro-
vides comprehensive compatibility with
Some manufacturers offer free software most OS or embedded equipment pos-
for encryption but as mentioned earlier, sessing a USB port.
28