Home » Computers » Data Recovery

Pen Drive - A Necessary Evil?

Sep 3, 2008
Technology has always been a necessary evil. The more the technology develops, the greater are the chances of its being abused. Pen drive, the small storage device used to store and transfer data to and from computers, has gained popularity due to its functionality. It has got thousands of uses. Ease of use and convenience is the prime reason of its popularity.

However, like many other equipments, pen drives are also a necessary evil and pose a potential security threat to the technology world. When placed in wrong hands, the portability and high storage capacity of the pen drive can be hazardous. The device has evolved as a threat to the corporate and other organizations where security of data is given utmost importance.

The threats that are associated with pen drives are serious. Some of them are listed below.

Stealing of data:

Apart from the defense department, the corporate sectors all over the world are under the threat of data theft for espionage. There is no dearth of incidents where spies, hackers and other source are employed to steal data. A pen drive gives ample of opportunity for the theft from an unattached or unlocked PC with a USB port. It is easy to access data and steal information like client list, research data or any other information. The hackers can even bring the software with a pen drive allowing the user to hack password or other confidential information.

Spreading virus:

Earlier, floppy drives and emails were considered as main source of virus to computers. However, there has been anti-virus software developed to counter virus and protect the PC. But with pen drive it is difficult to check the virus with the safeguard as the device can bypass the protection. It is almost impossible to defend against the viruses unless and until you have strong anti-virus policies or you are not scanning all files in your network. It is easy for a virus writer to corrupt the entire network of a corporate environment with a pen drive.

Plant malicious software:

Virus apart, it is not difficult for anyone to take any spamware and plant it in the PC. In corporate sectors the threat multiplies when employees use pen drives to bring unauthorized software or any other data such as software pranks, sharewares, mp3 files, pornography pictures, video clips and other inappropriate data that is against the corporate ethics. As pen drives allow more space, it is easy to bring bulky software which impossible with a floppy. Situation worsens when the software is used to crack password.

Causing data loss:

Pen drives barely allow any security system in terms of password or any other built in security feature. So it is more likely that if a person loses a pen drive, the data inside it can be accessed by anyone. If it falls in wrong hands he or she can misuse it. a pen drive can be easily stolen or misplaced and the data stored inside it can be easily manipulated. There have large demand for pen drives with some security systems such as finger-print reader or protective software.

There has been a conscious protest against pen drives in many private and government organization. Though it is a convenient device for the productive brains, it has proved to be beneficial for the thieves as well. Pen drives are small in size and have greater capacity to store information. Hence the thieves can carry the device stealthily in pockets and take information.

Unless and until any drastic step has been takes against it, the security of any organization can be in stake. Even a visitor can retrieve data easily from an open computer. Considering these threats, some companies have taken some protective measures for their security by banning pen drive inside company premises. It can reduce the threat to some extent.
About the Author
You can have access to portuguese articles about pen drives from page www.polomercantil.com.br/pen-drive.php

Roberto Sedycias works as IT consultant for www.polomercantil.com.br
Please Rate:
(Average: Not rated)
Views: 235
Print Email Report Share
Article Categories
    • Artists
    • Gambling
    • Humanities
    • Humor
    • Movies
    • Music
    • Photography
    • Tattoos
    • Television
    • Classic Cars
    • Motorcycles
    • Recreational Vehicles
    • SUVs
    • Trucks
    • Vans
    • Branding
    • Business Opportunities
    • Careers and Jobs
    • Corporate
    • Customer Service
    • Direct Mail
    • Entrepreneurship
    • Ethics
    • Financing
    • Franchising
    • Home-Based Business
    • Human Resources
    • Import and Export
    • Leadership
    • Management
    • Market Research
    • Marketing and Advertising
    • Negotiation
    • Network Marketing
    • Networking
    • Organizational
    • Presentation
    • Project Management
    • Public Relations
    • Small Business
    • Strategic Planning
    • Team Building
    • Telemarketing
    • Training
    • Ask an Expert
    • College and University
    • Home Schooling
    • K-12
    • Languages
    • Online Education
    • Psychology
    • Accounting
    • Credit
    • Currency Trading
    • Debt Consolidation
    • Insurance
    • Investing
    • Leasing
    • Loans
    • Mortgage
    • Mutual Funds
    • Personal Finance
    • Stock Market
    • Structured Settlements
    • Taxes
    • Wealth Building
    • Coffee
    • Cooking
    • Gourmet
    • Recipes
    • Wine and Spirits
    • Acne
    • Aerobics
    • Alternative Medicine
    • Beauty
    • Cancer
    • Cosmetics
    • Depression
    • Diabetes
    • Diseases and Conditions
    • Fitness Equipment
    • Fitness
    • Hair Loss
    • Heart Disease
    • Medicine
    • Men's Health
    • Muscle Building
    • Nutrition
    • Skin Care
    • Supplements and Vitamins
    • Weight Loss
    • Women's Health
    • Yoga
    • Arts and Crafts
    • Babies
    • Collecting
    • Elderly Care
    • Genealogy
    • Hobbies
    • Parenting
    • Pets
    • Pregnancy
    • Woodworking
    • Feng Shui
    • Gardening
    • Home Appliances
    • Home Security
    • Interior Design
    • Landscaping
    • Affiliate Programs
    • Article Marketing
    • Auctions
    • Audio
    • Banner Advertising
    • Blogging
    • Broadband
    • Domain Names
    • E-Books
    • E-Commerce
    • Email Marketing
    • Ezines and Newsletters
    • Forums
    • Internet Marketing
    • Link Popularity
    • Pay-Per-Click
    • Podcasting
    • RSS
    • Search Engine Marketing
    • Search Engine Optimization
    • Security
    • Social Media
    • Spam
    • Video
    • Viral Marketing
    • Web Design
    • Web Development
    • Web Hosting
    • Copyright
    • Cyber Law
    • Intellectual Property
    • National, State, Local
    • Patents
    • Regulatory Compliance
    • Trademarks
    • Buying
    • Selling
    • Baseball
    • Basketball
    • Boating
    • Cycling
    • Extreme Sports
    • Fishing
    • Football
    • Golf
    • Hockey
    • Hunting
    • Martial Arts
    • Running
    • Scuba Diving
    • Soccer
    • Swimming
    • Tennis
    • Dating
    • Divorce
    • Marriage
    • Weddings
    • Astrology
    • Buddhism
    • Christianity
    • Faith
    • Hinduism
    • Islam
    • Judaism
    • Meditation
    • Metaphysical
    • New Age
    • Cable and Satellite TV
    • Cell Phones
    • Communication
    • Gadgets and Gizmos
    • GPS
    • Satellite Radio
    • Video Conferencing
    • VoIP
    • Addictions
    • Coaching
    • Goal Setting
    • Motivational
    • Stress Management
    • Time Management
    • Clothing
    • Electronics
    • Fashion
    • Gifts
    • Jewelry
    • Causes and Organizations
    • Environment
    • History
    • Holidays
    • Men's Issues
    • Nature
    • Philosophy
    • Politics
    • Women's Issues
    • World Affairs
    • Air Travel
    • Camping
    • Cruises
    • Destinations
    • Outdoors
    • Article Writing
    • Book Reviews
    • Copywriting
    • Fiction
    • Non-Fiction
    • Poetry
    • Quotes
    • Screenplay
    • Tools and Resources