Direct Attacks on Computational Devices

Slides:



Advertisements
Similar presentations
GCSE ICT Networks & Security..
Advertisements

GCSE ICT By the end of this session, you will be able to: Explain main features of ATM machines Identify features of credit cards, debit cards, smart cards.
ATM Machines Name : Farah Rasmi Abu-Qasem Report about : ATM Machines supervised by : DR. Ahmed abu-mosameh Collage : College of Business July 2010.
Physical Security Locks & Safes Authentication Technologies
2.7.1.G1 © Family Economics & Financial Education – December 2005– Get Ready to Take Charge of Your Finances – Electronic Banking Bonanza – Slide 1 Funded.
Presentation by: Serena, Ann & Nicole
ICT at Work Banking and Finance.
Chapter 2: Physical Security 1. Section 2.2 – Locks and Keys Digital security often begins with physical security… 2.
HARDWARE INPUT DEVICES ITGS. Strand 3.1 Hardware Input Devices Keyboards Pointing devices: Mice Touch pads Reading tools: Optical mark recognition (OMR)
1.2.2.G1 © Take Charge Today – Revised May 2010 – Electronic Banking Bonanza – Slide 1 Funded by a grant from Take Charge America, Inc. to the Norton School.
Debit Card Plastic card that looks like a credit card
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
3.4 Electronic Monetary Processing. Overview Demonstrate and apply knowledge and understanding of: − EFT and identify the advantages and disadvantages.
Sara Elsafty.  A combination of hardware, software, infrastructure and trained personnel organized to facilitate planning, control, coordination, and.
Physical Security Slides from Michael Goodrich & Roberto Tamassia’s “Introduction to Computer Security”
Electronic ATM Fraud. ATM Fraud is where you goto an ATM and you insert your card into a skimmer which is placed in the card slot and it will take all.
Computer Parts There are many parts that work together to make a computer work.
{ How to Use An ATM A simple tutorial to teach how to use ATM Machines.
SMARTCARDS. What we’ll cover: How does the Smart Card work (layout and operating system)? Security issues for the card holder The present and future of.
THE FOLLOWING PRESENTATION CAN HELP YOU IN YOUR STUDIES. WATCHING AND LISTENING ATTENTIVELY IS ADVISED.
GCSE Information Technology Input Devices and Methods Objectives:  To understand what input devices are.  Identify their individual uses  Be able to.
By: Piyumi Peiris 11 EDO. Swipe cards are a common type of security device used by many people. They are usually a business-card-sized plastic card with.
Microsoft Office 2010 Introduction to Computers and How to Purchase Computers and Mobile Devices.
Computer Insides and Out Computer Basics 1.1. Basic Personal Computer System  A computer system consists of hardware and software components.  Hardware.
TC2-Computer Literacy Mr. Sencer February 3, 2010.
2.7.1.G1 © Family Economics & Financial Education – December 2005 – Get Ready To Take Charge of Your Finances – Electronic Banking Bonanza Funded by a.
Computer Terms. Computer A machine designed to run programs and store information that you create.
Wireless or wired connection of the technician’s smartphone to Cable Ties network.
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
ICT and Banks Banks use mainframe computers to maintain customer accounts. They store a record of each customer’s withdrawals and deposits. Each bank mainframe.
Eng. Hector M Lugo-Cordero, MS CIS4361 Department of Electrical Engineering and Computer Science February, 2012 University of Central Florida.
Smart Card Technology & Features
SECURITY OF DATA By: ADRIAN PERHAM. Issues of privacy; Threats to IT systems; Data integrity; Standard clerical procedures; Security measures taken to.
Networks. Network Hardware For any network to function successfully, you need specialized computer Hardware. However, without the right knowledge, you.
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
GOALS BUSINESS MATH© Thomson/South-WesternLesson 3.2Slide 1 3.2Electronic Banking Record electronic banking transactions Find account balance when banking.
Business Math 3-2 Electronic Banking. Start up Marc uses his charge card to pay for almost everything he buys. Lenore pays for most of her purchases with.
PRESENTATION Open an account in a bank. What is Debit and Credit card? Debit card You’ll be issued with a “ Debit card “ when you open an account Debit.
Computer main parts HARDWARE It corresponds to all physical and tangible parts of a computer: your electrical, electronic, electromechanical and mechanical.
TEMPEST AND ECHELON BY – Y.SRUTHI.  TEMPEST and ECHELON are the method of spying in a sophisticated manner.  Both technologies are a part of secret.
Communications security
NETWORKING & SYSTEM UPDATES
1 UNIT 19 Data Security 2. Introduction 2 AGENDA Hardware and Software protect ion Network protect ion Some authentication technologies :smart card Storage.
1 UNIT 19 Data Security 2 Lecturer: Ghadah Aldehim.
Computer Parts There are many parts that work together to make a computer work.
Digital Literacy: Computer Basics
Lesson 2 Component Overview Core Hardware Fundamentals.
Phishing Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money)
1.7.2.G1 © Family Economics & Financial Education – Revised May 2005 – Financial Institutions Unit – Electronic Banking Funded by a grant from Take Charge.
Microsoft Office 2010 Introduction to Computers and How to Purchase Computers and Mobile Devices.
Parts of a Computer Created by Carmen Garzes. An electronic device that manipulates information or data. It can store, retrieve or process data. There.
Topic 2 Input devices. Topic 2 Input devices Are used to get raw data into the computer so that it can be processed Include common input devices such.
Do Now Why do people have checking accounts?. Unit 4: Lesson 13: Checking Accounts Day 1 Objective: identify vocabulary terms related to checking accounts.
Electronic Banking & Security Electronic Banking & Security.
PCs ENVIRONMENT and PERIPHERALS Lecture 4. An expansion cards: - An expansion card (expansion board) is an electronic circuit board that adds more functionality.
WHAT SHOULD HAVE BEEN COVERED DAY ONE Part 4 Ms. T. N. Jones1.
Intro to Digital Technology Review for Final Introduction to Digital Technology Finals Seniors Monday, 5/16 – 2 nd Tuesday 5/17 – 1 st,3 rd Underclassmen.
Hardware Components Controller cards Bus Lines Ports Power Supply Secondary Storage.
SECURITY FEATURES OF ATM
UNIT 19 Data Security 2.
Discover the Boom in Electronic Banking!
C_ITCO011/C_ITCO111 LECTURER: E.DONDO
How An ATM Work's Prepaid by, kakani Dinesh.
Information on Types of Electronic Banking
Discover the Boom in Electronic Banking!
Level 2 Diploma Unit 11 IT Security
Chapter 2: Physical Security
Discover the Boom in Electronic Banking!
Banking Services Banks perform many functions and offer a wide range of services to consumers. Storing Money Banks provide a safe, convenient place for.
Uses of Telecommunications & ICT
Presentation transcript:

Direct Attacks on Computational Devices Introduction 4/15/2017 Direct Attacks on Computational Devices

Signal Eminations Computer screens emit radio frequencies that can be used to detect what is being displayed. Visible light reflections can also be used to reconstruct a display from its reflection on a wall, coffee mug, or eyeglasses. Both of these require the attacker to have a receiver close enough to detect the signal.

Acoustic Emissions Dmitri Asonov and Rakesh Agrawal published a paper in 2004 detailing how an attacker could use an audio recording of a user typing on a keyboard to reconstruct what was typed. Each keystroke has minute differences in the sound it produces, and certain keys are known to be pressed more often than others. After training an advanced neural network to recognize individual keys, their software recognized an average 79% of all keystrokes. microphone to capture keystroke sounds sound recording device

Hardware Keyloggers A keylogger is any means of recording a victim’s keystrokes, typically used to eavesdrop passwords or other sensitive information. Hardware keyloggers are typically small connectors that are installed between a keyboard and a computer. For example, a USB keylogger is a device containing male and female USB connectors, which allow it to be placed between a USB port on a computer and a USB cable coming from a keyboard. USB Keylogger

TEMPEST TEMPEST is a U.S. government code word for a set of standards for limiting information-carrying electromagnetic emanations from computing equipment. TEMPEST establishes three zones or levels of protection: An attacker has almost direct contact with the equipment, such as in an adjacent room or within a meter of the device in the same room. An attacker can get no closer than 20 meters to the equipment or is blocked by a building to have an equivalent amount of attenuation. An attacker can get no closer than 100 meters to the equipment or is blocked by a building to have an equivalent amount of attenuation.

Emanation Blockage To block visible light emanations, we can enclose sensitive equipment in a windowless room. To block acoustic emanations, we can enclose sensitive equipment in a room lined with sound-dampening materials. To block electromagnetic emanations in the electrical cords and cables, we can make sure every such cord and cable is well grounded and insulated.

Faraday Cages To block electromagnetic emanations in the air, we can surround sensitive equipment with metallic conductive shielding or a mesh of such material, where the holes in the mesh are smaller than the wavelengths of the electromagnetic radiation we wish to block. Such an enclosure is known as a Faraday cage.

Computer Forensics Computer forensics is the practice of obtaining information contained on an electronic medium, such as computer systems, hard drives, and optical disks, usually for gathering evidence to be used in legal proceedings. Unfortunately, many of the advanced techniques used by forensic investigators for legal proceedings can also be employed by attackers to uncover sensitive information.

Computer Forensics Forensic analysis typically involves the physical inspection of the components of a computer, sometimes at the microscopic level, but it can also involve electronic inspection of a computer’s parts as well.

ATMs An automatic teller machine (ATM) is any device that allows customers of financial institutions to complete withdrawal and deposit transactions without human assistance. Typically, customers insert a magnetic stripe credit or debit card, enter a PIN, and then deposit or withdraw cash from their account. The ATM has an internal cryptographic processor that encrypts the entered PIN and compares it to an encrypted PIN stored on the card (only for older systems that are not connected to a network) or in a remote database. ATM

ATMs To ensure the confidentiality of customer transactions, each ATM has a cryptographic processor that encrypts all incoming and outgoing information, starting the moment a customer enters their PIN. The current industry standard for ATM transactions is the Triple DES (3DES) cryptosystem, a legacy symmetric cryptosystem with up to 112 bits of security. The 3DES secret keys installed on an ATM are either loaded on-site by technicians or downloaded remotely from the ATM vendor. ATM 3DES Encryption Bank

Attacks on ATMs Lebanese loop: A perpetrator inserts this sleeve into the card slot of an ATM. When a customer attempts to make a transaction and inserts their credit card, it sits in the sleeve, out of sight from the customer, who thinks that the machine has malfunctioned. After the customer leaves, the perpetrator can then remove the sleeve with the victim’s card. Skimmer: a device that reads and stores magnetic stripe information when a card is swiped. An attacker can install a skimmer over the card slot of an ATM and store customers’ credit information without their knowledge. Later, this information can be retrieved and used to make duplicates of the original cards. Fake ATMs: capture both credit/debit cards and PINs at the same time.