As information technology has rapidly developed and as it has penetrated every
aspect of human existence, the number of crimes aimed at breaching information
security has grown.
Cyber criminals have displayed great interest in the activity of state structures and
commercial enterprises. They make attempts at theft and disclosure of confidential
information, doing damage to business reputations, breaching business continuity,
and consequently breach an organization's information resources. These acts can
do extensive damage to assets, both tangible and intangible.
It is not big companies alone who are at risk. Individual users can also be attacked.
Using various tools, criminals gain access to personal data (bank account and credit
card numbers and passwords), cause your system to malfunction, or gain complete
access to your computer. Then that computer can be used as part of a zombie
network, a network of infected computers used by hackers to attack servers, send
out spam, harvest confidential information, and spread new viruses and Trojans.
In today's world, everyone acknowledges that information is a valuable asset and
should be protected. At the same time, information must be accessible for a certain
user group (for instance, employees, clients and partners of a business). This is
why there is a need to create a comprehensive information security system.
Today, malicious programs propagate so quickly that antivirus companies have to
release updates as quickly as possible to minimize the amount of time that users
will potentially be at risk. Unfortunately, many antivirus companies are unable to do
this - users often receive updates once they are already infected.
USB flash drive is widely used for storing and transmitting information. It is also an
important transmission route of threats. However, few antivirus products can
provide 100% protection against any threats via USB drive, especially for offline
computer that is not connected to Internet. This is why there is a need to develop
a security system to protect computers against any threats via USB drive.