Upload the files to Computer B and erase the files from the Iron Key.įastest method to move files between Computer A and Computer B. Save the required information to an Use a non-air gapped system to securely transfer the files to a non-air gapped system at Computer B location. 30 cards cost about as much as a single Iron Key The odds of getting infected by malware are low. Destroy the flash memory card.įlash memory cards are very cheap, so you can use a card once. Mail the memory card to Computer B location for data transfer. Save the required information to a flash memory card in an encrypted format. Requires mailing costs and potential delays in deliver Requires multiple Iron Keys, which cost about $130 a piece. ![]() This solution is more secure than a stand USB drive. Iron Keys are not perfect, but they do use AES 256-bit hardware encryption, have password protection and use onboard anti-virus scanning and active malware defenses. Mail the Iron Key to Computer B location for data transfer. Save the required information to an Iron Key. You did state that these systems must be air gapped, so I will assume that the information is critical thus it needs to be protected. I don't know the classification/confidentially level of the data that needs to be moved from Computer A to Computer B. We're not concerned so much about the integrity of the data (it's already encrypted + ECC formatted), more the possibility for Computer A to be infected with malware from the USB while it writes the data out. The device used for the transfer may be destroyed after a single use if that improves the security. The information is on the order of tens of MB, and will only be transferred about once every 24 hours. The systems must be airgapped, and they must have this information transfer occur. Antivirus or otherwise that similarly protects the computer from USB based malware.Where to find the state of the art as far as group policy for disabling any kind of execution of code that comes in over USB.Alternatives to USB, for example if we have a serial port available.My threat model does not involve state level actors, merely people knowledgeable enough to use USB malware. My current plan to accomplish this is using USB flash drives. The computers may be hundreds of feet to tens of miles from each other. Both will be running a relatively recent version of Windows 10. I'm trying to take information that's on Computer A, write it onto some form of persistent storage, and copy that information onto Computer B.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |