Top Banner
Physical Security Slides from Michael Goodrich & Roberto Tamassia’s “Introduction to Computer Security”
76

Physical Security Slides from Michael Goodrich & Roberto Tamassia’s “Introduction to Computer Security”

Dec 22, 2015

Download

Documents

Edwina Arnold
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Physical Security Slides from Michael Goodrich & Roberto Tamassia’s “Introduction to Computer Security”

Physical Security

Slides from Michael Goodrich & Roberto Tamassia’s “Introduction to

Computer Security”

Page 2: Physical Security Slides from Michael Goodrich & Roberto Tamassia’s “Introduction to Computer Security”
Page 3: Physical Security Slides from Michael Goodrich & Roberto Tamassia’s “Introduction to Computer Security”
Page 4: Physical Security Slides from Michael Goodrich & Roberto Tamassia’s “Introduction to Computer Security”
Page 5: Physical Security Slides from Michael Goodrich & Roberto Tamassia’s “Introduction to Computer Security”
Page 6: Physical Security Slides from Michael Goodrich & Roberto Tamassia’s “Introduction to Computer Security”
Page 7: Physical Security Slides from Michael Goodrich & Roberto Tamassia’s “Introduction to Computer Security”
Page 8: Physical Security Slides from Michael Goodrich & Roberto Tamassia’s “Introduction to Computer Security”
Page 9: Physical Security Slides from Michael Goodrich & Roberto Tamassia’s “Introduction to Computer Security”
Page 10: Physical Security Slides from Michael Goodrich & Roberto Tamassia’s “Introduction to Computer Security”
Page 11: Physical Security Slides from Michael Goodrich & Roberto Tamassia’s “Introduction to Computer Security”
Page 12: Physical Security Slides from Michael Goodrich & Roberto Tamassia’s “Introduction to Computer Security”
Page 13: Physical Security Slides from Michael Goodrich & Roberto Tamassia’s “Introduction to Computer Security”
Page 14: Physical Security Slides from Michael Goodrich & Roberto Tamassia’s “Introduction to Computer Security”
Page 15: Physical Security Slides from Michael Goodrich & Roberto Tamassia’s “Introduction to Computer Security”
Page 16: Physical Security Slides from Michael Goodrich & Roberto Tamassia’s “Introduction to Computer Security”
Page 17: Physical Security Slides from Michael Goodrich & Roberto Tamassia’s “Introduction to Computer Security”
Page 18: Physical Security Slides from Michael Goodrich & Roberto Tamassia’s “Introduction to Computer Security”
Page 19: Physical Security Slides from Michael Goodrich & Roberto Tamassia’s “Introduction to Computer Security”
Page 20: Physical Security Slides from Michael Goodrich & Roberto Tamassia’s “Introduction to Computer Security”
Page 21: Physical Security Slides from Michael Goodrich & Roberto Tamassia’s “Introduction to Computer Security”
Page 22: Physical Security Slides from Michael Goodrich & Roberto Tamassia’s “Introduction to Computer Security”
Page 23: Physical Security Slides from Michael Goodrich & Roberto Tamassia’s “Introduction to Computer Security”

Basically: any user who has access to any lock in the system and a working key to that lock can fairly easily reverse engineer the Grand Master Key that opens all locks in the system

Page 24: Physical Security Slides from Michael Goodrich & Roberto Tamassia’s “Introduction to Computer Security”
Page 25: Physical Security Slides from Michael Goodrich & Roberto Tamassia’s “Introduction to Computer Security”
Page 26: Physical Security Slides from Michael Goodrich & Roberto Tamassia’s “Introduction to Computer Security”
Page 27: Physical Security Slides from Michael Goodrich & Roberto Tamassia’s “Introduction to Computer Security”
Page 28: Physical Security Slides from Michael Goodrich & Roberto Tamassia’s “Introduction to Computer Security”
Page 29: Physical Security Slides from Michael Goodrich & Roberto Tamassia’s “Introduction to Computer Security”
Page 30: Physical Security Slides from Michael Goodrich & Roberto Tamassia’s “Introduction to Computer Security”
Page 31: Physical Security Slides from Michael Goodrich & Roberto Tamassia’s “Introduction to Computer Security”
Page 32: Physical Security Slides from Michael Goodrich & Roberto Tamassia’s “Introduction to Computer Security”
Page 33: Physical Security Slides from Michael Goodrich & Roberto Tamassia’s “Introduction to Computer Security”
Page 34: Physical Security Slides from Michael Goodrich & Roberto Tamassia’s “Introduction to Computer Security”
Page 35: Physical Security Slides from Michael Goodrich & Roberto Tamassia’s “Introduction to Computer Security”
Page 36: Physical Security Slides from Michael Goodrich & Roberto Tamassia’s “Introduction to Computer Security”
Page 37: Physical Security Slides from Michael Goodrich & Roberto Tamassia’s “Introduction to Computer Security”
Page 38: Physical Security Slides from Michael Goodrich & Roberto Tamassia’s “Introduction to Computer Security”
Page 39: Physical Security Slides from Michael Goodrich & Roberto Tamassia’s “Introduction to Computer Security”
Page 40: Physical Security Slides from Michael Goodrich & Roberto Tamassia’s “Introduction to Computer Security”
Page 41: Physical Security Slides from Michael Goodrich & Roberto Tamassia’s “Introduction to Computer Security”
Page 42: Physical Security Slides from Michael Goodrich & Roberto Tamassia’s “Introduction to Computer Security”
Page 43: Physical Security Slides from Michael Goodrich & Roberto Tamassia’s “Introduction to Computer Security”
Page 44: Physical Security Slides from Michael Goodrich & Roberto Tamassia’s “Introduction to Computer Security”
Page 45: Physical Security Slides from Michael Goodrich & Roberto Tamassia’s “Introduction to Computer Security”
Page 46: Physical Security Slides from Michael Goodrich & Roberto Tamassia’s “Introduction to Computer Security”
Page 47: Physical Security Slides from Michael Goodrich & Roberto Tamassia’s “Introduction to Computer Security”
Page 48: Physical Security Slides from Michael Goodrich & Roberto Tamassia’s “Introduction to Computer Security”
Page 49: Physical Security Slides from Michael Goodrich & Roberto Tamassia’s “Introduction to Computer Security”
Page 50: Physical Security Slides from Michael Goodrich & Roberto Tamassia’s “Introduction to Computer Security”
Page 51: Physical Security Slides from Michael Goodrich & Roberto Tamassia’s “Introduction to Computer Security”
Page 52: Physical Security Slides from Michael Goodrich & Roberto Tamassia’s “Introduction to Computer Security”
Page 53: Physical Security Slides from Michael Goodrich & Roberto Tamassia’s “Introduction to Computer Security”
Page 54: Physical Security Slides from Michael Goodrich & Roberto Tamassia’s “Introduction to Computer Security”
Page 55: Physical Security Slides from Michael Goodrich & Roberto Tamassia’s “Introduction to Computer Security”
Page 56: Physical Security Slides from Michael Goodrich & Roberto Tamassia’s “Introduction to Computer Security”
Page 57: Physical Security Slides from Michael Goodrich & Roberto Tamassia’s “Introduction to Computer Security”
Page 58: Physical Security Slides from Michael Goodrich & Roberto Tamassia’s “Introduction to Computer Security”
Page 59: Physical Security Slides from Michael Goodrich & Roberto Tamassia’s “Introduction to Computer Security”
Page 60: Physical Security Slides from Michael Goodrich & Roberto Tamassia’s “Introduction to Computer Security”

Shoulder Surfing

Page 61: Physical Security Slides from Michael Goodrich & Roberto Tamassia’s “Introduction to Computer Security”
Page 62: Physical Security Slides from Michael Goodrich & Roberto Tamassia’s “Introduction to Computer Security”
Page 63: Physical Security Slides from Michael Goodrich & Roberto Tamassia’s “Introduction to Computer Security”
Page 64: Physical Security Slides from Michael Goodrich & Roberto Tamassia’s “Introduction to Computer Security”
Page 65: Physical Security Slides from Michael Goodrich & Roberto Tamassia’s “Introduction to Computer Security”
Page 66: Physical Security Slides from Michael Goodrich & Roberto Tamassia’s “Introduction to Computer Security”
Page 67: Physical Security Slides from Michael Goodrich & Roberto Tamassia’s “Introduction to Computer Security”
Page 68: Physical Security Slides from Michael Goodrich & Roberto Tamassia’s “Introduction to Computer Security”
Page 69: Physical Security Slides from Michael Goodrich & Roberto Tamassia’s “Introduction to Computer Security”
Page 70: Physical Security Slides from Michael Goodrich & Roberto Tamassia’s “Introduction to Computer Security”
Page 71: Physical Security Slides from Michael Goodrich & Roberto Tamassia’s “Introduction to Computer Security”
Page 72: Physical Security Slides from Michael Goodrich & Roberto Tamassia’s “Introduction to Computer Security”
Page 73: Physical Security Slides from Michael Goodrich & Roberto Tamassia’s “Introduction to Computer Security”

http://wp.me/P29YQz-k

SKIMMING IS THE THEFT OF CREDIT CARD INFORMATION USED IN AN OTHERWISE

LEGIT IMATE TRANSACTION

73

Credit Card Skimmer

http://telecommunication.itb.ac.id/~tutun/ET4085

73

Page 74: Physical Security Slides from Michael Goodrich & Roberto Tamassia’s “Introduction to Computer Security”

http://wp.me/P29YQz-k

74

First trick

http://telecommunication.itb.ac.id/~tutun/ET4085

74

A credit card “skimmer” is mounted to the front of the normal ATM card slot which reads the ATM card number and either stores or transmits the number to the scammers.

Once in place it’s very difficult to tell that a skimmer is attached to the ATM machine.

Any cards used in this machine will have their magnetic strip recorded and the scammers will be able to use this information to create a “clone” of this card using a magnetic strip writerhttp://www.expandmywealth.com/category/

credit-cards/

Page 75: Physical Security Slides from Michael Goodrich & Roberto Tamassia’s “Introduction to Computer Security”

http://wp.me/P29YQz-k

75

http://telecommunication.itb.ac.id/~tutun/ET4085

75

The scammers can take things even further and install a pamplet box containing a concealed camera to record the user’s PIN number http://www.expandmywealth.com/category/

credit-cards/

Page 76: Physical Security Slides from Michael Goodrich & Roberto Tamassia’s “Introduction to Computer Security”

http://wp.me/P29YQz-k

The Lebanese Loop Trick76

The Lebanese Loop consist of a strip or sleeve of metal or plastic (such as x-ray film or VCR tape) that is inserted into the ATM’s card slot

The ends of the strip are folded upwards. The foldered ends are glued to the outer surface of the ATM card slot, making the Lebanese Loop

virtually impossible to detect Slits are cut on both sides of the Lebanese Loop to prevent the card from being returned at the

end of the transaction. This causes the card to remain in the machine. Once the ATM user leaves the scammer can now return to the machine and pull down the ends of

the loop to retrieve the ATM card and remove it from the slot. The scammer now has the ATM card and is free to use it provided he was able to record or view

the user entering in their PIN number

the cut

http://www.expandmywealth.com/category/credit-cards/