Ch02_Physical_Security

Chapter 2 Physical Security

Category

  1. Physical Protections and Attacks
  2. Locks and Safes
  3. Authentication Technologies
  4. Direct Attacks Against Computers
  5. RFID security

Physical Protections and Attacks

Destructive vs. Nondestructive Entry

Bypass : Side Channel Attacks

Barcode 条形码

as two-dimensional patterns 二维码

Authentication via Barcodes

however, barcodes provide convenience but not security.

Smart Cards

optionally with an on-board microprocessor

Smart card technology are extremely difficult to duplicate.

SIM Cards

subscriber identity module card

A SIM card is issued by a network provider. It maintains personal and contact information for a user and allows the user to authenticate to the cellular network of the provider.

Passport

an embedded RFID

offensive:Wiretapping 窃听器

offensive:Acoustic Emission

an attacker could use an audio recording of a user typing on a keyboard to reconstruct what was typed.

offensive:Hardware keyloggers

defensive:Faraday Cages

Computer Forensics

obtaining evidence contained on an electronic medium to be used in legal proceedings

ATM-3DES

automatic teller machine

Attacks

  1. Lebanese loop
  2. Skimmer
  3. Fake ATMs

computer Forensics

  1. capture more volatile evidence first
  2. Hidden Data in the Hard Drive Slack Space
    1. The logical end of the file (i.e., the end of the data actually in the file) and
    2. The physical end of the file (i.e., the end of the last sector devoted to the file).
  3. Create a Duplicate Image

How to Hide Data?

  1. Cryptography
  2. Steganography
    1. The process of hiding data inside other data (e.g. image files).
  3. Change file names and extensions
    1. E.g. rename a .doc file to a .tmp file
  4. Hidden tracks
    1. most hard disks have # of tracks hidden (i.e. track 0)
    2. They can be used to hide/read data by using a hex editor
  5. Deleted Files
    1. not truly deleted, merely marked for deletion.

Disk Wiping