USB
This is a common attack used by attacker who has physical access to the workstation. The attacker would use what is called a USB Dumper to transfer malicious software from a flash drive to the victim’s computer. The source of this is malicious agent and this is an internal threat because the employees are allowed to download and add software to the systems. Therefore, it is easy for them to use a USB Dumper to infect the system with malware. The likelihood is medium for this to happen, because the workstations are used by investigators. However bad people work as investigators too and they can be even more dangerous. If this should happen the severity of impact would very high as the malware could potentially wipe out our system. In the scenario the pop up could be from an adware virus that was installed via a USB Dumper (OWASP Top 10, 2015). To prevent this from happening we must implement controls that will teach the associates best practices. The first control will be to educate the employees and give them real world training with the use of inoculation training. The second control will be to implement a policy have all OS patches and other software updated when they become available. Another control is to implement a policy that all the USB ports on …show more content…
This is an insecure way of getting resources and could end up making the computer vulnerable, since the software is coming from an unknown person’s computer. This is a threat in the scenario because untrained investigators routinely download and install software and plug-ins. Many of the software could be coming from peer-to-peer sites. This means that the software could have been manipulated and wrapped with virus. This is highly likely to occur since peer-to-peer software are readily available on the internet. If this should happen the impact would be devastating (OWASP Top 10,