Improve company productivity with a Business Account.Sign Up

x
?
Solved

Are documents on a USB Thumb drive really secure???

Posted on 2006-10-30
12
Medium Priority
?
282 Views
Last Modified: 2010-04-11
I have a situation where I am haivng to view secure (Secret and Top Secret) documents , PDF's, .doc's, images... that are stored on a thumb drive or a cd.

My question is;

Once a file is opened from the CD or thumb drive, viewed edited or what ever I am going to do with it and the thumb drive is taken  or the CD ejected from the PC is there any way for someone to come along and view the file I was working on?

I know word creates temp files in the TEMP directory, do these temp files persist once the application is closed or I remove the memory stick?

Any thoughts/comments would be appreciated

J
0
Comment
Question by:salsipius
10 Comments
 
LVL 14

Expert Comment

by:chris_calabrese
ID: 17836456
There will always be fragments of the files memory and/or the page/swap file.

Whether there will be other files depends on exactly what you did with the file when it was in the PC. Word, in particular, makes all kinds of backup and recovery files when you edit a document.

And since these are Secret and higher, you also have to consider the possibility that someone may have trojaned the machine to e.g. take a backup of anything on an inserted CD or thumb drive.

In short, you should not use these files on un-trusted machines (where trusted here implies all its Orange Book / Common Criteria meaning)
0
 
LVL 38

Expert Comment

by:younghv
ID: 17841703
salsipius,
My civilian email address is in my profile.
Please contact me directly.
Thank you,

Vic
0
 
LVL 3

Expert Comment

by:mahe2000
ID: 17842892
unfortunatelly windows allways let documents around temp directories
0
Worried about phishing attacks?

90% of attacks start with a phish. It’s critical that IT admins and MSSPs have the right security in place to protect their end users from these phishing attacks. Check out our latest feature brief for tips and tricks to keep your employees off a hackers line!

 
LVL 38

Expert Comment

by:younghv
ID: 17843113
salsipius,
My civilian email account might be malfunctioning, but I still haven't heard from you.
Look at chris_calabrese's profile, then look at mine.

You need some really strong advice about what you are doing and you need to get it now.

0
 
LVL 16

Expert Comment

by:ThinkPaper
ID: 17933217
Assuming it's government, normally you should be using approved thumbdrives only on approved computers.
For example, I am only allowed to use government-furnished (and approved) unclassified thumbdrives on unclassified government computers... and same goes for classified info - use government approved classified thumbdrives on classified government computers. This stuff should never be used on outside computers (or at home) and should never be taken home. This is basically the only best protection you can get.

Files that are temporarly opened do have temp files on the machine and are generally "gone" once you close it - but (not necessarily) there is always the chance of someone being able to access you system and access any files you have access to (or are currently accessing). Plus if you file fails to save, there's a chance a temp file is stored on your machine. So it's not always reliable.
This is why it's IMPORTANT that these files are being viewed on secure and approved machines (and this is a strict rule that needs to be adhered to). If you are not a Information Assurance guy or Security person - you shouldn't need to worry about anything else as long as you are following the basic rules.
0
 
LVL 27

Expert Comment

by:Tolomir
ID: 18108489
I would use knoppix and use openoffice and acrobat reader to read these files.

Knoppix or also ubuntu is a live linux system without the need to install it before use, it can be just booted from a CD Rom - so the temp space is a pure ramdisk.

www.ubuntu.com
www.knoppix.org

This is how to mount the usb drive:
http://www.ubuntuforums.org/showthread.php?t=314400

Tolomir
0
 
LVL 38

Expert Comment

by:younghv
ID: 18230523
Tolomir,
I swapped some emails with salsipius when this was posted and I think he has a good handle on the situation.

Would like to see him come in and close this out, though.


Vic
0
 
LVL 38

Expert Comment

by:younghv
ID: 18234422
The emails were about Regulations dealing with the proper handling of Classified documents.
The bottom line is that no Classified document can be opened/viewed on any AIS (Automated Information System) that is not certified for the level of classification.


Vic
0
 
LVL 27

Expert Comment

by:Tolomir
ID: 18234491
ACK

I did not made these rules, but we all have to keep them in mind.

Tolomir
0
 
LVL 38

Accepted Solution

by:
younghv earned 2000 total points
ID: 18234876
Tolomir,
Understood - and a good rule.

As long as the AIS and the Media involved are handled IAW (In Accordance With) Regulations, everything is copecetic.

Anyone reading this who is not familiar with the Regulations should not be handling Classified documents.

Vic
0

Featured Post

The Firewall Audit Checklist

Preparing for a firewall audit today is almost impossible.
AlgoSec, together with some of the largest global organizations and auditors, has created a checklist to follow when preparing for your firewall audit. Simplify risk mitigation while staying compliant all of the time!

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

Cloud computing is a model of provisioning IT services. By combining many servers into one large pool and providing virtual machines from that resource pool, it provides IT services that let customers acquire resources at any time and get rid of the…
This is the conclusion of the review and tests for using two or more Password Managers so you don't need to rely on just one. This article describes the results of a lot of testing in different scenario's to reveal which ones best co-exist together.…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

584 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question