Sections 2.1 Physical Protection and Attacks 2.2 – Locks and Keys Digital security often begins with physical security… 1.

Slides:



Advertisements
Similar presentations
What Homeowners Need to Learn About Lock Security Joseph Kingma Medeco Security Locks.
Advertisements

Tool Marks and Impressions. Tool Manufacturing  When tools are made, during the manufacturing process imperfections are left on the tools’ surface. 
Kwikset Rekey Ultramax Rekeying the Ultramax by Kwikset this presentation is designed for beginners.
Section 2.2 – Locks and Keys Digital security often begins with physical security… 1.
11 Forcible Entry Skill Drills. 2 Objectives (1 of 3) Force entry through an inward-opening door. Force entry through an outward-opening door. Use the.
Physical and Environmental Security Chapter 5 Part 1 Pages 427 to 456.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
CSA 223 network and web security Chapter one
Security+ Guide to Network Security Fundamentals
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
Copyright Infringement
Evidor: The Evidence Collector Software using for: Software for lawyers, law firms, corporate law and IT security departments, licensed investigators,
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Lock Picking Michael Lee Math 187 Spring Lock Picking and Cryptanalysis Cryptanalysis is the study of techniques that facilitate the deciphering.
By Edith Butler Fall Our Security Ways we protect our valuables: Locks Security Alarm Video Surveillance, etc.
1 Telecom Cabling Ladder racks systems and relay racks Ladder racks systems and relay racks.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Three Lines of Defense Presented by the Arapahoe County Sheriff’s Office.
Residential Construction Residential Doors *Source: (1) Carpentry & Building Construction Feirer & Freirer.
Cs490ns-cotter1 Physical Security Digital security often begins with physical security… Locks and Keys Authentication 1.
Physical Security By: Christian Hudson. Overview Definition and importance Components Layers Physical Security Briefs Zones Implementation.
Election Commission of India
Week 11 - Friday.  What did we talk about last time?  Security planning  Risk analysis  Security policies.
What does “secure” mean? Protecting Valuables
© 2008 Delmar, Cengage Learning Property Security, Emergency Response, and Fire Protection Systems Chapter 13.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
CIS 450 – Network Security Chapter 16 – Covering the Tracks.
Unethical use of Computers and Networks
Cloud Computing Characteristics A service provided by large internet-based specialised data centres that offers storage, processing and computer resources.
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
ANTI-BULLYING AT KNIGHTLOW CYBER BULLYING. Cyber bullying: fact or fiction? 1. There are at least 7 forms of bullying that happen using technology True.
Patient Data Security and Privacy Lecture # 7 PHCL 498 Amar Hijazi, Majed Alameel, Mona AlMehaid.
FS2600 August News/Announcements Defcon Site fail Contact info.
An Approach To Automate a Process of Detecting Unauthorised Accesses M. Chmielewski, A. Gowdiak, N. Meyer, T. Ostwald, M. Stroiński
Protecting Students on the School Computer Network Enfield High School.
11 Forcible Entry Skill Drills. 2 Objectives Force entry through inward- and outward- opening doors. Use the triangle method to open an overhead garage.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
1 Class 15 System Security. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized data access,
UNOCODE 299 Copyright Silca S.p.A UNOCODE 299.
What security is about in general? Security is about protection of assets –D. Gollmann, Computer Security, Wiley Prevention –take measures that prevent.
Intrusion Detection System (IDS) Basics LTJG Lemuel S. Lawrence Presentation for IS Sept 2004.
Chap1: Is there a Security Problem in Computing?.
Computer Security The World of Cyber Crime Presentation Details This presentation will explain the purpose of bypassing security or stealing information.
Overview of Firewalls. Outline Objective Background Firewalls Software Firewall Hardware Firewall Demilitarized Zone (DMZ) Firewall Types Firewall Configuration.
INFORMATION TECHNOLOGY IN A GLOBAL SOCIETY: SECURITY Taylor Moncrief.
Computer Security By Duncan Hall.
The Locksmith V 3.1 Main Menu Note: Please use the Buttons to Navigate (you can use ‘Esc’ anytime to exit)
A presentation by John Rowley for IUP COSC 356 Dr. William Oblitey Faculty member in attendance.
Physical Security Concerns for LAN Management By: Derek McQuillen.
Computer Security Sample security policy Dr Alexei Vernitski.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Physical Security Ch9 Part I Security Methods and Practice CET4884 Principles of Information Security, Fourth Edition.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
OPERATING SYSTEMS (OS) By the end of this lesson you will be able to explain: 1. What an OS is 2. The relationship between the OS & application programs.
ICT Laptops Passwords Encryption Back-ups Data Protection and the Internet Viruses Social Networking / Professional Conduct.
Computer Security Keeping you and your computer safe in the digital world.
By: Brett Belin. Used to be only tackled by highly trained professionals As the internet grew, more and more people became familiar with securing a network.
FIREWALLS By k.shivakumar 08k81f0025. CONTENTS Introduction. What is firewall? Hardware vs. software firewalls. Working of a software firewalls. Firewall.
Blue Access Technologies
Chapter 6: Securing the Cloud
Week 12 - Friday CS363.
Chapter 11 crime and security in the networked economy
Intorduction Manufacturing company establish with a group of engineers, management Graduates, manufacturing experts and other specialized manufacturing.
Five Unethical Uses of Computers
Faculty of Science IT Department By Raz Dara MA.
Physical Security.
Chapter 7 – and 8 pp 155 – 202 of Web security by Lincoln D. Stein
Presentation transcript:

Sections 2.1 Physical Protection and Attacks 2.2 – Locks and Keys Digital security often begins with physical security… 1

Physical Protections and Attacks Define physical security: the use of physical measures to protect valuables, information, or access to restricted resources. Computer science views this as the following: – Protection by location – Physical intrusion detection – Hardware attacks – Eavesdropping – Physical interface attacks. 2

Legal Notice Laws regarding lock picking vary significantly state-by- state In most states the purchase and possession of dedicated lock picking tools is legal – But, penalties are raised significantly if you get caught using them in the commission of a crime 3 Public domain image from

What Is Physical Security? Any physical object that creates a barrier to unauthorized access This includes, but is not limited to: locks, latches, safes, alarms, guards, guard dogs, doors, windows, walls, ceilings, floors, fences, door strikes, door frames and door closers 4

Is Physical Security An IT Concern? You have been working hard to secure your network from cyber attacks – Redundant layers of antivirus programs, firewalls and intrusion detection systems should protect against every possible electronic method of entry But what if an attacker gains access to the server room or network wiring closet... Is you network still safe? 5

Destructive vs. Nondestructive Entry Destructive entry – Involves using force to defeat physical security – Methods involve crowbars, bolt cutters and sledge hammers – Negative impact on IT resources is apparent – Remediation steps also obvious Nondestructive entry – Compromises security without leaving signs of a breach – Defeats intrusion detection – Greater and long-term threat 6

Compromising Locks For centuries, the lock has been one of the cornerstones of physical security – We rely on dozens of them every day to protect people and assets The trust most people place in locks is unwarranted – Most locks can be easily compromised with nondestructive methods – Sometimes within seconds and with readily available tools “Locks keep honest people honest” 7

Lock Picking Lock picking had been the exclusive art of locksmiths, professional thieves, spies and magicians for hundreds of years However, with the advent of the Internet, information about lock picking methods and tools has become readily available – E.g., YouTube has many lock picking videos – Try google with “Lock picking”. You get ~ 3,760,000 entries. 8

Lock Picking in Movies Genuine lock picking in movies used to be prohibited Before 1967, the Hays code (Motion Picture Production Code) required censorship of Hollywood movies – “All detailed (that is, imitable) depiction of crime must be removed, such as lock picking or mixing of chemicals to make explosives” 9 Public domain image from

LOCK TYPES 10 Image from used with permission under Gnu Free Documentation License 1.2

TSA Lock The U.S. government has established a set of rules for the inspection of baggage without the presence of passengers Special TSA-approved locks allow both inspection and some protection against theft An important element is that the inspection must be easily verifiable by the user 11 Public domain government image Do the TSA locks keep your belongings safe?

Define “ward” 12 a. The projecting ridge of a lock or keyhole that prevents the turning of a key other than the proper one. b. The notch cut into a key that corresponds to such a ridge.

Warded Locks Locks of this type were used in ancient times The key moves the bolt assisted by a support spring Security relies on the fact that not all keys pass through the key hole 13

How a Warded Lock Works 14

How a Warded Lock Works 15

Use of Warded Locks Today Large warded locks are still in use today in the UK and Ireland for internal and external doors. Warded locks in America are commonly used in inexpensive padlocks, cabinet locks, and other low-security applications, since a well- designed skeleton key can successfully open a wide variety of warded locks. 16

Skeleton Key Usually for old style doors or desks Different concentric obstructions Easy to lock pick with Skeleton keys They were first used in ancient Rome 17 Images from used by permission under Gnu free documentation license 1.2

A skeleton key is one that has been filed or cut so that it can be used to unlock a variety of warded locks each with a different configuration of wards. This can usually be done by removing most of the center of the key, allowing it to pass by the wards without interference, unlocking or locking the lock. To counteract this, wards can be placed not just in the center but on the outside as well, making attempts at making a successful skeleton key harder. 18

Pick vs. Bypass Breaking open a lock in a nondestructive manner can be achieved either through: Picking: acting on the lock mechanism simulating the operation of the key Bypassing: manipulation of the bolt without using the lock 19

1860: Yale Pin Tumbler Lock Double-detainer theory of locking Created shear line 20 Modern version of the Egyptian single-pin design Utilizes two pins for locking Public domain image of Linus Yale, Jr. Image from used with permission under Gnu Free Documentation License 1.2

Terminology (Warded Lock) shell or hull 21 pin tumbler spring sheer line cylinder or plug keyway top or driver bottom or key driver Image from used with permission under Gnu Free Documentation License 1.2

How Does a Pin Tumbler Lock Work? 1.When a key is not present, the pin stacks are pushed down by the springs so that the driver (top) pins span the plug and the outer casing, preventing the plug from rotating. 2.When the correct key is inserted, the ridges of the key push up the pin stacks so that the cuts of the pin stacks are aligned with the shear line. 3.The alignment of the cuts with the shear line allows the plug to be rotated. 22 Images from used with permission under Gnu Free Documentation License 1.2

How Does a Pin Tumbler Lock Work? If an inappropriate key is insered, then the pins do not align along the shear line and the lock does not turn. 23 Image from used with permission under Gnu Free Documentation License 1.2

LOCK PICKING 24 Photo by Dan Rosenberg included with permission.

Lockpicking Tools Feelers Scrubbers Tension tools 25 Photo by Jennie Rogers included with permission.

Feeler Picking Apply light tension Lift one pin at a time – Identify binding pin Lift binding pin until it reaches the shear line Setting the binding pin will rotate the lock slightly Find next pin and repeat the process 26 Image from used with permission under Gnu Free Documentation License 1.2

Scrubbing / Raking Apply light tension Work over pins back to front in a circular motion – attempting to pop them into the shear line with the combination of tension Good for beginners Usually employ snake pick or half diamond 27 Photo by Jennie Rogers included with permission.

The Math of Lock Picking Suppose we have – 40 different kinds of key blanks – 7 pin positions – 8 different possible pin heights Then the total number of possible locks is – 40 x 8 7 = 83,886,080 Not all these are possible, however, as it is difficult to put long teeth next to small teeth. 28

29 Rights Amplification in Master Keyed Systems Reverse engineer master key from change key Each lock has P pins, with D potential cut heights Create D-1 test keys for each pin position p Cut all pin positions except p as known change key Published by Matt Blaze at Penn

30 Rights Amplification (continued) Query the lock until you find each pin position i.e. To determine first key cut depth insert each of the D-1 test keys and determine which one does not bind to the pin Repeat for each pin

31 Rights Amplification Statistics Consumes P(D-1) blanks Can reduce to P blanks and file down on the fly But this looks suspicious Search space is practically pruned by manufacturer specs maximum distance limit in legal adjacent cuts Older installations sometimes require MKs to be higher on the pin stack

Tubular lock Usually on car alarms or vending machines 6-8 pins Easy to pick with special tool The tool could become a new key 32 Images from used with permission under Gnu Free Documentation License 1.2

Statistics 4-6 pins, 4-10 levels 10 6 = 1,000,000 possible keys! The angular positions of the cylinders allow to obtain about 180 different positions (180  10) 6 = × (Un) fortunately there is a need for some tolerance in locks 33

Combination Locks There are locks that do not require a physical key to be opened but a code Number of combinations is – Number of digits times – Length of combination 34 Images from and used with permission under Gnu Free Documentation License 1.2

Combination Locks Inexpensive combination padlocks allow attacks based on reducing the space of possible combinations to try – The gears have a higher tolerance of the external disk combination – Nominal number of combinations is 40 3 = 64,000 – Possibilities can be reduced to about 80 by detecting critical gear points 35 Public domain image from E.g., see

Bumping A different way of picking locks Virtually all traditional Yale and similar locks can be opened by bumping What lock pickers say about bumping: – RELIABLE – REPEATABLE – SIMPLE TO LEARN 36 Photo by Jennie Rogers included with permission.

Bump Keys Driver pins “jump” higher than the cylinder just for an instant If a light rotational force is applied, the cylinder will turn Lock bumping is a very fast method for opening the lock The lock is not damaged in any way Few key-pin locks cannot be bumped 37 Photo by Jennie Rogers included with permission.

Pick Gun Manual and electronic pick guns are a popular method for quick and easy ways of opening up doors The pick gun is used in a similar way but usually has a trigger that creates an upward movement that must be repeated rapidly to open the lock 38 Public domain image from

Side Channel Attacks Rather than attempting to directly bypass security measures, an attacker instead goes around them by exploiting other vulnerabilities not protected by the security mechanisms. Side channel attacks are sometimes surprisingly simple to perform. 39 High security lock Cheap hinges Public domain image by Pearson Scott Foresman from