StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

USB device encryption. Types of USB flash drives - Essay Example

Cite this document
Summary
Flash drive refers to an external USB storage device which is small in size that is able to read and write on to flash memory. Therefore a USB flash drive is referred to as a data storage device including flash memory that has an integrated universal series bus interface…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.9% of users find it useful
USB device encryption. Types of USB flash drives
Read Text Preview

Extract of sample "USB device encryption. Types of USB flash drives"

Download file to see previous pages

Corsair flash padlock Kingston data Traveler secure Ironkey secure Flash drive Lexar jumpdrive secure II Looks like pull-off cap with Numeric pad down the front Uses 256-bit AES hardware based encryption Uses AES,CBC-mode, 128-bit encryption Uses 256-bit AES encryption Has speed of 15.9MB/sec Speed of 20.2MB/sec Speed of 18MB/sec (4GB) 15.5MB/sec Has average read rate of 15.4MB/sec Read rate of 24MB/sec Read rate 25MB/sec 15.9MB/sec Price range between $27-$39 for 1GB Price from $60 for 512MB Price $149 for 4GB and $71.

50 for 1GB Price ranges $15.48 for 1GB has five numbered buttons as entry to security No minimum characters required. Generate password to about 99 characters. 32 characters for name and password I would recommend Kingston data traveler secure flash drive. This is because it is small in size thus portable. Too its password protection and its data encryption are compatible with several operating systems such as windows 2000, windows XP and Win98SE. The flash device has high speed both read and write.

It durability cannot be doubted. That is why there is a five year warranty on a device bought. Data protection is the base line of this device. It has a higher security levels. Its high memory also acts as advantage to this device as privacy edition can hold up to 8GB. Computer foot print Creating a new foot print Downey and Stein have outlined how to create a new foot print. In the library manager screen first choose create new footprint. Name the footprint appropriately using an appropriate name such as ‘mybank”.

Make a drawing of the outline in the zoomed window. Select save as and thereafter choose on create new library button. Create a new directory with the details about the bank accounts. Name the directory such as “library”. This has to be separate from where the layout and capture files were initially stored. Give a name to the new library file such as “homefile”. Save it in “mybank”. At last there are two files “homefile” that contain the foot print “mybank” Using ones EID credentials, log into foot prints of your bank.

Click on the new request button that appears at the top-left corner. The incident information has then to be filled. The notes should be through so as to supply ITS with enough information for quick identification and to easily resolve the issue. The contact information is updated in the contact information. The information can be modified as it may be appropriate so as to enable contact with the ITS. The data is then saved. The updates are received through the email or by logging into the footprint system.

Data on the details will be displayed in a “hours per day” and “days per month”. Time/days location ISP provider processor RAM Computer IP 10-11.00 11-12.00 12-1300 The characteristics that will help identify the computer in use will include computer’s IP address, mother board details and also the name accorded to it operating system. If access into footprint data is attempted either from a different computer or different way from the characteristics given, access first of all will be denied.

The second option will be where one will be asked for a password before accessing the information. The last one will be where an individual must register as members to gain access. HTTPS This is a combination of hyper text transfer

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“USB device encryption. Types of USB flash drives Essay”, n.d.)
Retrieved from https://studentshare.org/information-technology/1397703-usb-device-encryption-types-of-usb-flash-drives
(USB Device Encryption. Types of USB Flash Drives Essay)
https://studentshare.org/information-technology/1397703-usb-device-encryption-types-of-usb-flash-drives.
“USB Device Encryption. Types of USB Flash Drives Essay”, n.d. https://studentshare.org/information-technology/1397703-usb-device-encryption-types-of-usb-flash-drives.
  • Cited: 0 times

CHECK THESE SAMPLES OF USB device encryption. Types of USB flash drives

Windows XP Operating System

This paper ''Windows XP Operating System'' tells that Windows has evolved from a program consisting of 4000 lines of codes of an assembly language that ran in 8 Kbytes of memory using then Intel 8086 microprocessor to a more complex and robust type of computer system which runs most of today's computers....
8 Pages (2000 words) Essay

Vulnerability Assessment on your System at Home

They are searching for any loop holes to govern the networks and computing devices along with highly classified.... The vulnerabilities can be found in the web browser and their plug-ins, web servers and application… We talk about the launch of a new software or operating system with better graphical user interface; functionality, utilities, and security, at the other end hackers discuss how to breach the security Hackers having time, resources and enthusiasm can breach into any system....
14 Pages (3500 words) Essay

Vint Cerf, a Program Manager at DARPA

"Vint Cerf, a Program Manager at DARPA" paper focuses on the father of the internet was known as Vint Cerf.... Vint Cerf, is one the most accomplished and intellectual individuals that have dynamically revolutionized the world.... At DARPA, Cerf actually introduced the idea of TCP/IP.... nbsp; … The dynamics of Web 2....
7 Pages (1750 words) Coursework

Microsoft Windows 7 Security Best Practices and Vulnerabilities

Additionally, administrators can redefine the rules developed for the different types of executable files.... Windows 7 uses a wide variety of tools to deal with these unpredictable security threats such as windows application locker and Bit locker encryption.... This paper presents an analysis of Microsoft Windows 7 operating system in the context of its security support....
11 Pages (2750 words) Research Paper

Devices of USB Communications

This report "Devices of usb Communications" discusses the storage device of a USB Mass while using USB of High Speed for communication and a card of SD/MMC to facilitate storage.... hellip; Devices of usb communications are within the class of Universal Serial Bus that might include interfaces such as data interface, audio, and other interfaces related to communications done in mass.... Operating systems and lines of communications of RS-232 are to the side of usb....
9 Pages (2250 words) Report

Key Aspects of Data Storage Management

Although the threat of stealing data by employees, while working on IT projects exists for a long time, the abundant availability of cheap usb flash drives, now, has given a serious dimension to it.... usinesses must use strong protective software, which can secure the data and scan all external devices such as usb flash drives.... Thi paper outlines the security threat posed by USB drives, implementing USB security, strategy for data storage management, information lifecycle management....
6 Pages (1500 words) Coursework

The Key Failure Points in the Tjx System

… The paper "The Key Failure Points in Tjx System" is a good example of a case study on information technology.... According to Ivey (2), there was a huge data theft in the storage of retails discount that is also termed as 'hacking'.... This occurred toward the profit-motivated cybercrime and hackers were able to rob TJX's most valuable information that had been stored....
7 Pages (1750 words) Case Study

What Is New in Windows 7

was released in 1990 with improved graphics, new icons, can use memory beyond 640K, comes with SDK or Windows Software Development Kit for writing Windows-based applications, and VxDs or virtual device drivers to minimize hardware dependencies.... … The paper "What Is New in Windows 7" is an outstanding example of an essay on information technology....
11 Pages (2750 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us