Download presentation
Published byEdwina Arnold Modified over 9 years ago
1
Physical Security Slides from Michael Goodrich & Roberto Tamassia’s “Introduction to Computer Security”
23
Basically: any user who has access to any lock in the system and a working key to that lock can fairly easily reverse engineer the Grand Master Key that opens all locks in the system
60
Shoulder Surfing
73
Credit Card Skimmer 73 Skimming is the theft of credit card information used in an otherwise legitimate transaction
74
First trick 74 A credit card “skimmer” is mounted to the front of the normal ATM card slot which reads the ATM card number and either stores or transmits the number to the scammers. Once in place it’s very difficult to tell that a skimmer is attached to the ATM machine. Any cards used in this machine will have their magnetic strip recorded and the scammers will be able to use this information to create a “clone” of this card using a magnetic strip writer
75
75 The scammers can take things even further and install a pamplet box containing a concealed camera to record the user’s PIN number
76
The Lebanese Loop Trick
the cut The Lebanese Loop consist of a strip or sleeve of metal or plastic (such as x-ray film or VCR tape) that is inserted into the ATM’s card slot The ends of the strip are folded upwards. The foldered ends are glued to the outer surface of the ATM card slot, making the Lebanese Loop virtually impossible to detect Slits are cut on both sides of the Lebanese Loop to prevent the card from being returned at the end of the transaction. This causes the card to remain in the machine. Once the ATM user leaves the scammer can now return to the machine and pull down the ends of the loop to retrieve the ATM card and remove it from the slot. The scammer now has the ATM card and is free to use it provided he was able to record or view the user entering in their PIN number
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.