What is the term for an infection vector that uses attractive USB drives left in public areas?

Prepare for the GIAC Information Security Fundamentals (GISF) exam with our comprehensive study materials, including flashcards, multiple choice questions, and detailed explanations. Enhance your information security knowledge and boost your exam confidence today!

The term for an infection vector that utilizes attractive USB drives left in public areas is known as USB seeding. This tactic involves planting USB drives strategically in locations where they might be picked up by unsuspecting individuals. Once the USB is connected to a computer, malware can be executed, potentially compromising the device and allowing attackers to gain unauthorized access to sensitive information.

This method is particularly effective because it relies on human curiosity and the tendency of individuals to connect unknown devices to their computers. The effectiveness of USB seeding stems from social engineering principles, as the victim may not be aware of the risk associated with using an unidentified USB drive.

The other terms listed do not accurately describe this specific tactic. For example, USB poisoning typically refers to altering the data on a USB drive to introduce malicious content but does not encapsulate the act of leaving drives in public for others to find. USB cloning involves creating exact copies of USB drives, usually for legitimate purposes, and is not related to infection strategies. Similarly, USB sniffer refers to tools used to capture data being transmitted over USB connections, which is a different concept altogether. Thus, USB seeding is the correct term as it precisely defines the act of leveraging found USB drives to instigate malware infections.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy