Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống
1
/ 82 trang
THÔNG TIN TÀI LIỆU
Thông tin cơ bản
Định dạng
Số trang
82
Dung lượng
2,5 MB
Nội dung
Security+
All-In-One Edition
Chapter 7–Physical Security
Brian E. Brzezicki
Note
Note: A LOT of this chapter is “missing” from the book.
That is the book is only 12 pages I have put over 70
slides in this chapter (one of the longest) These
things you should expect to see on the exam. So
pay extra attention to these slides!
Physical Security
There is NO security without
Physical Security
We spend A LOT of money on logical (technical)
security. However without physicalsecurity there is
NO security. Physicalsecurity is a weak link
usually!
•
Attackers can walk off with machines
•
If I can get physical access to your machine I will
be able to get whatever info I want or load “bad”
software on it, or even just change the
root/administrator account password!
•
Plug into a network and attack it from within!
Some physicalSecurity Attacks
(187)
•
LiveCDs (Knoppix, BackTrack)
•
USB/CDs and “auto play” – talk about this LATER
•
No BIOS/Default BIOS passwords
•
Disk Imaging (how?)
•
Copying off sensitive data
Physical Security Layers (n/b)
•
Deterrence – fences, guards, signs
•
Reducing/Avoiding damage by Delaying attackers
– slow down the attackers (locks, guards, barriers)
•
Detection – motion sensors, smoke detectors
•
Incident assessment – response of guards, and
determination of damage level
•
Response procedures – fire suppression, law
enforcement notification etc
Physical Security Terms and
Concepts
Bollards
Bollards (n/b)
Bollards are small concrete pillars, sometimes
containing lights or flowers.
They are used to stop people from driving through
a wall, often put between a building and parking
lot.
They can be arranged to form a natural path for
walking.
Fencing (n/b)
Can deter and delay intruders, first line of defense
•
Fences 3-4 feet high only deter casual
trespassers
•
Fences 6-7 feet high are considered too high to
climb easily
•
Fences 8 feet high should are considered
serious. Use for Critical areas
[...]... strength to support the security application This might also include fire rating! Zones (n/b) Fences, Walls, Bollards, etc along with access control mechanisms can be brought together to create security zones Each zone has some different security level or work type • Example – Lobby – low security, public access – Offices – medium security, restricted access – R&D – high security, extremely restricted... should be directed AWAY from the security guards etc Locks (n/b) • Mechanical – use a physical key (Warded lock or tumbler) – Warded lock – basic padlock, cheap (image) – Tumbler lock – more piece that a warded lock, key fits into a cylinder which moved the metal pieces such that the bolt can slide into the locked and unlocked position • Pin tumbler – uses pins • Wafer – uses wafer (not very secure)... Pick – used in conjunction with a tension wrench to manipulate the pins into place so you can turn the cylinder Visualization next slide Lock Picking Locks • Combination locks – rather than use a key, turn Locks (n/b) • Cipher locks – electronic locks – Combination can be changed – Combination can be different for different people – Can work during different times of day – Can have emergency codes – Can... (n/b) There are different lock grades • Grade 1 – commercial • Grade 2 – heavy duty residential, light commercial • Grade 3 – residential throw away locks There are also 3 cylinder categories Low – no pick or drill resistance provided Medium – a little pick resistance High – higher degree of pick resistance Attacks against key type locks (n/b) Tension wrench – shaped like an L and is used to apply tension... auto-irises Intrusion Detection Systems (n/b) IDS (physical IDS, NOT network IDS) – help detect the physical presence of an intruder Can be multiple types Electromechanical – traditional types, determine a opening of a window by a break in connectivity – Vibration sensors are also electromechanical – Pressure pads are also electromechanical IDS (n/b) Photoelectric – uses light beams to detect when something... high security, extremely restricted access (see next slide) Security Zones (n/b) • Zones are used to physically separate areas into different security areas •Each inner level becomes more restricted and more secure •Stronger Access Control and Monitoring at the entry point to each zone Lighting (n/b) Lighting is obviously important in perimeter security It decreases the probability of criminal activity... Photoelectric – uses light beams to detect when something crosses the beam (slide image) Passive Infrared (PIR) – monitors heat signatures in a room (a lot of home automatically light systems are of this type) (slide image) Acoustical Detection – uses sound Proximity detector/capacitance detectors – emits a measurable magnetic field If field is disrupted it sets off the alarm (usually this field is a very... Passive Infrared (PIR) – monitors heat signatures in a room (a lot of home automatic light systems are of this type) Photoelectric IDS Photoelectric – uses light beams to detect when something crosses the beam Personnel Access Controls Personnel access controls There are different technologies to grant access to a building, generally called an “access token” • User activated – a user does something... biometrics) • Proximity devices/transponders – a system recognizes the presence of an object (Electronic access control tokens) is a generic term for proximity authentication systems) Smart Cards Vs Memory cards What is memory Cards? (see slide) What is a smart Card? (see slide) How are they different? Which is more secure? Memory Cards Smart Card Biometrics (195) • Bio – life, metrics - measure • Biometrics . create
security zones. Each zone has some different
security level or work type.
•
Example.
–
Lobby – low security, public access
–
Offices – medium security, .
Physical Security
There is NO security without
Physical Security
We spend A LOT of money on logical (technical)
security. However without physical security