Chapter 17: Physical Security Flashcards Preview

CEH - Certified Ethical Hacker > Chapter 17: Physical Security > Flashcards

Flashcards in Chapter 17: Physical Security Deck (13):
1

physical security is often overlooked

One of the most basic and best controls to protect physical interaction are PASSWORDS

90% of users use dictionary words or proper names
47% use their own name or pet's name

Ways to protect your system with a password:

USE PW ON SCREENSAVER

LOCK COMPUTER AFTER CERTAIN AMOUNT OF TIME

WARNING BANNERS //high-profile msg appears stating user of a system is held accountable for their actions and they may be monitored

2

Second physical security issue: THEFT

In particular: Hard drives such as USBs or FireWires

One way to secure these devices is through ENCRYPTION
Tools: PGP (pretty good privacy), TrueCrypt, Microsoft BitLocker

POD SLURPING //using a portable storage device to steal data quickly

Con of Drive Encryption //decrease in system performance

3

techniques to stop dumpster diving (of CDs, DVDs, Drives, etc)

DRIVE WIPING
ZEROIZATION
DEGAUSSING

DRIVE WIPING //act of overwriting all information on the drive (typically several times. i.e. DoD.5200.28-STD) can be reused

ZEROIZATION //associated with cryptography; mechanical cryptographic devices would reset to 0 to prevent anyone from recovering the key; Overwrites the data with ZEROES

DEGAUSSING // permanently destroy contents of hard drive or magnetic media; POWERFUL MAGNET uses field strength to penetrate the media and reverse the polarity of the magnetic particles (cannot be reused)

The only method more secure is physical destruction

4

Consider the following physical structures when Site Surveying

Fences //how high the fence looks can psychologicaly deter an intruder

Gates

Doors and Mantraps (or portals) //strong doors or locks for important rooms such as room with severs, frames and the hinges it is on is also important //Mantraps are phone booth sized object with door on either side and only enough space to hold on occupant where a code must be entered to pass visual screening

Locks // include two types Mechanical (ward and pin and tumbler) or Cipher locks (smart)

Walls, Ceilings, Floors //should be sturdy,
FALSE ceilings are not good which is where a wall goes up to a DROP ceiling but not to the roof of a building
Ceiling mounted air ducts should be smaller then allowance for person to crawl in
For floors, some floors are raised meaning there exists space underneath it (listening devices can be placed)

BOLLARDS can be used to stop vehicles from backing into a building, hitting the window, and allowing intruder in


Windows //tinted, shatterproof helps; sensors

5

Basic components used to pick locks are:

TENSION WRENCHES //small, angled, flathead screwdrivers

PICKS //similar to dentist picks

6

Technique for picking is called

SCRAPING //tension held on lock by tension wrench while pins are scraped quickly; Pins are then placed in mechanical bind and stuck in the unlocked position

7

Forms of Authentication:

Contactless cards//ran by RFID

BIOMETRICS //physiological characteristic unique to individual
accuracy of these are measured by % it produces of two types of errors
FRR (false rejection rate/type 1 error) //measurement of % of individuals who should have gotten in but were not allowed
FAR (false acceptance rate/type 2 error) //gained access but shouldn't have

8

Forms of Biometrics include:

Finger Scan //finger print

Hand Geometry Systems //finger and hand print

Palm Scan //creases and ridges

Retina Pattern Systems

Iris Recognition //blood vessels in back of eye

Voice Recognition

Keyboard Dynamics //analyzes user's speed and pattern of typing

9

Types of windows

Standard //lowest level of protection

Polycarbonate Acrylic //superior protection

Wire Reinforced //shatterproof

Laminated //like automobile, laminate is added between layers of glass to increase strength and decrease shatter potential

Solar Film //moderate level of security and decreases shatter

Security Film //transparent film to increase strength in case of breakage or explosion

10

Defense in Depth

delay attacker rather than prevent an attack

Layer controls; for physical security, minimum of 3 layers

First line of defense is the BUILDING PERIMETER *fences, gates, bollards*

2nd layer is BUILDING EXTERIOR *roof, walls, floor, doors, ceilings, windows*

3rd layer is INTERIOR CONTROLS *Locks, safes, containers, cabinets, interior lighting, policies and procedures placed on computers*

11

Which of the following is a defective control when not used in real time?

a//fences
b//alarms
c//cctv
d//locks

c//alarms, they detect and react but do not prevent attackers

12

For a fence to deter a determined intruder, it should be at least how many feet tall?

a//4
b//5
c//6
d//10

c//6

13

During an assessment you discovered that the target company was using a fax machine. Which of the following is the least important?

a//the phone # is publicly available
b//fax machine is an open, unsecured area
c//faxes frequently sit in the printer tray
d//the fax machine uses a ribbon

A. A publicly available phone number is not a
security risk in many cases as the machine may be
one that can be sent information from anywhere.