Presentation is loading. Please wait.

Presentation is loading. Please wait.

Physical Security Slides from Michael Goodrich & Roberto Tamassia’s “Introduction to Computer Security”

Similar presentations


Presentation on theme: "Physical Security Slides from Michael Goodrich & Roberto Tamassia’s “Introduction to Computer Security”"— Presentation transcript:

1 Physical Security Slides from Michael Goodrich & Roberto Tamassia’s “Introduction to Computer Security”

2

3

4

5

6

7

8

9

10

11

12

13

14

15

16

17

18

19

20

21

22

23 Basically: any user who has access to any lock in the system and a working key to that lock can fairly easily reverse engineer the Grand Master Key that opens all locks in the system

24

25

26

27

28

29

30

31

32

33

34

35

36

37

38

39

40

41

42

43

44

45

46

47

48

49

50

51

52

53

54

55

56

57

58

59

60 Shoulder Surfing

61

62

63

64

65

66

67

68

69

70

71

72

73 Credit Card Skimmer 73 Skimming is the theft of credit card information used in an otherwise legitimate transaction

74 First trick 74 A credit card “skimmer” is mounted to the front of the normal ATM card slot which reads the ATM card number and either stores or transmits the number to the scammers. Once in place it’s very difficult to tell that a skimmer is attached to the ATM machine. Any cards used in this machine will have their magnetic strip recorded and the scammers will be able to use this information to create a “clone” of this card using a magnetic strip writer

75 75 The scammers can take things even further and install a pamplet box containing a concealed camera to record the user’s PIN number

76 The Lebanese Loop Trick
the cut The Lebanese Loop consist of a strip or sleeve of metal or plastic (such as x-ray film or VCR tape) that is inserted into the ATM’s card slot The ends of the strip are folded upwards. The foldered ends are glued to the outer surface of the ATM card slot, making the Lebanese Loop virtually impossible to detect Slits are cut on both sides of the Lebanese Loop to prevent the card from being returned at the end of the transaction. This causes the card to remain in the machine. Once the ATM user leaves the scammer can now return to the machine and pull down the ends of the loop to retrieve the ATM card and remove it from the slot. The scammer now has the ATM card and is free to use it provided he was able to record or view the user entering in their PIN number


Download ppt "Physical Security Slides from Michael Goodrich & Roberto Tamassia’s “Introduction to Computer Security”"

Similar presentations


Ads by Google