Chapter 2: Physical Security 1. Section 2.2 – Locks and Keys Digital security often begins with physical security… 2.

Slides:



Advertisements
Similar presentations
RFID Access Control System March, 2003 Softrónica.
Advertisements

Section 2.3 – Authentication Technologies 1. Authentication The determination of identity, usually based on a combination of – something the person has.
Physical Security Locks & Safes Authentication Technologies
Lecture 6 User Authentication (cont)
© Paradigm Publishing, Inc. 2-1 Chapter 2 Input and Processing Chapter 2 Input and Processing.
Chapter 5 p. 6 What Is Input? What is input? p. 230 and 232 Fig. 5-1 Next  Input device is any hardware component used to enter data.
TPS – UNIQUE HARDWARE ( Option 1: Transaction Processing Systems.
Chapter 5 Input and Output. What Is Input? What is input? p. 166 Fig. 5-1 Next  Input device is any hardware component used to enter data or instructions.
Automatic Data Capture Devices & Methods
Direct Attacks on Computational Devices
HARDWARE INPUT DEVICES ITGS. Strand 3.1 Hardware Input Devices Keyboards Pointing devices: Mice Touch pads Reading tools: Optical mark recognition (OMR)
Your Interactive Guide to the Digital World Discovering Computers 2012 Edited by : Huda Al-Omair.
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
AN OVERVIEW OF BIOMETRIC ATMs. WHY ? CONVENTIONAL ATMs -> BIOMETRIC ATMs Environmental Concerns Environmental Concerns Security Concerns Security Concerns.
Section – Biometrics 1. Biometrics Biometric refers to any measure used to uniquely identify a person based on biological or physiological traits.
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
FIT3105 Smart card based authentication and identity management Lecture 4.
Security Awareness: Applying Practical Security in Your World
RFID in Mobile Commerce and Security Concerns Chassica Braynen April 25, 2007.
Your Interactive Guide to the Digital World Discovering Computers 2012.
Input devices, processing and output devices Hardware Senior I.
Adapted from CTAE Resources Network PROFITT Curriculum Basic Computer Skills Module 1 Hardware.
Brendan Cooney CSC 152. What is Input? Any data or instructions entered into the memory of a computer Data- unprocessed information Instructions- steps.
Marjie Rodrigues
Security-Authentication
SMARTCARDS. What we’ll cover: How does the Smart Card work (layout and operating system)? Security issues for the card holder The present and future of.
Cs490ns-cotter1 Physical Security Digital security often begins with physical security… Locks and Keys Authentication 1.
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
Chapter 5 Input. What Is Input? What are the input devices? Input device is any hardware component used to enter data or instructions Data or instructions.
IT Introduction to Information Technology CHAPTER 05 - INPUT.
Authentication Approaches over Internet Jia Li
Chapter 10: Authentication Guide to Computer Network Security.
INPUT DEVICES. KEYBOARD Most common input device for a computer.
OCR GCSE ICT DATA CAPTURE METHODS. LESSON OVERVIEW In this lesson you will learn about the various methods of capturing data.
Alternative Input Devices Part B There will be a test on this information (both part a & b).
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
© Paradigm Publishing Inc. 2-1 Chapter 2 Input and Processing.
Biometrics The Password You’ll Never Forget Shadi Azoum & Roy Donaldson CIS 4360 – Introduction to Computer Security.
1 Lecture 8: Authentication of People what you know (password schemes) what you have (keys, smart cards, etc.) what you are (voice recognition, fingerprints,
Input Devices Ali El-Achmar Matt Leclair TEJ20. What Are Input Devices? ● Input Devices are data going into the computer from the user.
Input By Hollee Smalley. What is Input? Input is any data or instructions entered into the memory of a computer.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
 Data or instructions entered into memory of computer  Input device is any hardware component used to enter data or instructions 2.
Biometrics Authentication Technology
Section 2.3 – Authentication Technologies 1. Authentication The determination of identity, usually based on a combination of – something the person has.
Discovering Computers Fundamentals, Third Edition CGS 1000 Introduction to Computers and Technology Fall 2006.
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
IT Fundamentals1 Input and Output Describe input Input Devices Keyboard entry, pointing devices, scanning devices Image capture, digitizing, audio-input.
Describe direct data entry and associated devices, e. g
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
1 UNIT 19 Data Security 2. Introduction 2 AGENDA Hardware and Software protect ion Network protect ion Some authentication technologies :smart card Storage.
IDENTITY NUMBERS BY A.M.VILLAVAN M.TECH(COS). RFID Acronymn: Radio Frequency Identification Device RFID is a technology, whose origins are found in the.
Physical security By Ola Abd el-latif Abbass Hassan.
INPUT AND OUTPUT DEVICES Group: 10 Batch: TIS 76 Gaby Alexander Damini Mangaj Amritpreet Singh Arunavathi Suraj Medda.
CSCE 201 Identification and Authentication Fall 2015.
My topic is…………. - It is the fundamental building block and the primary lines of defense in computer security. - It is a basic for access control and.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
Shital ghule..  INTRODUCTION: This paper proposes an ATM security model that would combine a physical access card,a pin and electronic facial recognition.
Introduction to Input Devices. Input Devices Units that gather information and transform that information into a series of electronic signals for the.
AGENDA Introduction Kind of information smart card contain
Prepared by Hussein Alhashimi
Input Devices.
Authentication.
OCR GCSE ICT Data capture methods.
OCR GCSE ICT Data capture methods.
Biometric technology.
Chapter 2: Physical Security
Module 2 OBJECTIVE 14: Compare various security mechanisms.
Presentation transcript:

Chapter 2: Physical Security 1

Section 2.2 – Locks and Keys Digital security often begins with physical security… 2

Is Physical Security An IT Concern? You have been working hard to secure your network from cyber attacks But what if an attacker gains access to the server room or network wiring closet... – Is you network still safe? Attackers could use ‘side-channel attack’ to facilitate cyber-attack: – Use keyboard sound to know key strokes – Use computer screen light change to detect information – Attach USB key to spy/record 3

Compromising Locks For centuries, the lock has been one of the cornerstones of physical security – We rely on dozens of them every day to protect people and assets The trust most people place in locks is unwarranted – Most locks can be easily compromised with nondestructive methods – Sometimes within seconds and with readily available tools “Locks keep honest people honest” 4

1860: Yale Pin Tumbler Lock Double-detainer theory of locking Created shear line 5 Modern version of the Egyptian single-pin design Utilizes two pins for locking Public domain image of Linus Yale, Jr. Image from used with permission under Gnu Free Documentation License 1.2

How Does a Pin Tumbler Lock Work? 1.When a key is not present, the pin stacks are pushed down by the springs so that the driver (top) pins span the plug and the outer casing, preventing the plug from rotating. 2.When the correct key is inserted, the ridges of the key push up the pin stacks so that the cuts of the pin stacks are aligned with the shear line. 3.The alignment of the cuts with the shear line allows the plug to be rotated. 6 Images from used with permission under Gnu Free Documentation License 1.2

How Does a Pin Tumbler Lock Work? If an inappropriate key is insered, then the pins do not align along the shear line and the lock does not turn. 7 Image from used with permission under Gnu Free Documentation License 1.2

Tubular lock Usually on car alarms or vending machines 6-8 pins Easy to pick with special tool The tool could become a new key 8 Images from used with permission under Gnu Free Documentation License 1.2

Section 2.3 – Authentication Technologies 9

Authentication The determination of identity, usually based on a combination of – something the person has (like a smart card or a radio key fob storing secret keys), – something the person knows (like a password), – something the person is (like a human with a fingerprint). 10 Something you are Something you know Something you have radio token with secret keys password=ucIb()w1V mother=Jones pet=Caesar human with fingers and eyes

Barcodes Developed in the 20th century to improve efficiency in grocery checkout. First-generation barcodes represent data as a series of variable-width, vertical lines of ink, which is essentially a one-dimensional encoding scheme. Some more recent barcodes are rendered as two-dimensional patterns using dots, squares, or other symbols that can be read by specialized optical scanners, which translate a specific type of barcode into its encoded information. 11

Magnetic Stripe Cards Plastic card with a magnetic stripe containing personalized information about the card holder. The first track of a magnetic stripe card contains the cardholder’s full name in addition to an account number, format information, and other data. The second track may contain the account number, expiration date, information about the issuing bank, data specifying the exact format of the track, and other discretionary data. 12 Public domain image by Alexander Jones from

Magnetic Stripe Card Security One vulnerability of the magnetic stripe medium is that it is easy to read and reproduce. Magnetic stripe readers can be purchased at relatively low cost, allowing attackers to read information off cards. – When coupled with a magnetic stripe writer, which is only a little more expensive, an attacker can easily clone existing cards. So, many uses require card holders to enter a PIN to use their cards – Even for credit cards, many require input your zip code 13 Public domain image by Alexander Jones from

Smart Cards Smart cards incorporate an integrated circuit, optionally with an on-board microprocessor (for computing, encryption, decryption), allowing the data on the card to be accessed/altered – Can provide secure authentication mechanisms that protect the information of the owner and are difficult to duplicate. – May be used as “electronic wallet,” with funds for various services transactions It means each transaction does not go through bank account 14 Public domain image from Circuit interface

SIM Card and its Security Many mobile phones use a special smart card called a subscriber identity module card (SIM card). – SIM card maintains personal information for a user and allows the user to authenticate to the cellular network of the provider. – Each SIM card corresponds to a record in the database of subscribers maintained by the network provider. A SIM card has a unique hardware 18-bit integrated circuit card ID (ICCID) Next, a SIM card contains a unique international mobile subscriber identity (IMSI), which identifies the owner’s country, network, and personal identity. SIM cards also contain a 128-bit secret key. This key is used for authenticating a phone to a mobile network. 15

GSM Challenge-Response Protocol 1.When a cellphone wishes to join a cellular network it connects to a local base station owned by the network provider and transmits its IMSI. 2.If the IMSI matches a subscriber’s record in the network provider’s database, the base station transmits a 128-bit random number to the cellphone. 3.This random number is then encoded by the cellphone with the subscriber’s secret key stored in the SIM card using a proprietary encryption algorithm known as A3, resulting in a ciphertext that is sent back to the base station. 4.The base station then performs the same computation, using its stored value for the subscriber’s secret key. If the two ciphertexts match, the cellphone is authenticated to the network and is allowed to make and receive calls. 16 IMSI = (this phone’s ID) R = a 128-bit random number (the challenge) E K (R) = the 128-bit random number encrypted using the subscriber’s secret key K (the response)

RFIDs Radio frequency identification, or RFID, is a rapidly emerging technology that relies on small transponders to transmit identification information via radio waves. RFID chips feature an integrated circuit for storing information, and a coiled antenna to transmit and receive a radio signal. 17

RFID Technology RFID tags must be used in conjunction with a separate reader or writer. While some RFID tags require a battery, many are passive and do not. The effective range of RFID varies from a few centimeters to several meters, – Not necessary for a tag to be in the line of sight of the reader 18

RFID Technology Applications Expensive product anti-theft ID (like a barcode) Car key fobs (speedpass) Electronic toll transponders – Active one (need battery) – Passive one (more convenient, but need powerful reader) 19

Biometrics Biometric refers to any measure used to uniquely identify a person based on biological or physiological traits. 20 Image from used with permission under the Creative Commons Attribution 3.0 Unported license

Requirements for Biometric Identification Universality. Almost every person should have this characteristic. Distinctiveness. Each person should have noticeable differences in the characteristic. Permanence. The characteristic should not change significantly over time. Collectability. The characteristic should have the ability to be effectively determined and quantified. 21

Biometric Identification 22 Feature vector Reference vector Comparison algorithm matchesdoesn’t match Biometric Reader

Candidates for Biometric IDs Fingerprints Retinal/iris scans DNA “Blue-ink” signature Voice recognition Face recognition Gait recognition 23 Public domain image from Public domain image from Public domain image from

Security and Privacy Concerns for Biometric Data A person’s biometric data is permanent – One-time leak results in compromising forever – Will reveal private information of the person Saving hash value is not practical since bio- data allows small variations 24

Section 2.4 – Direct Attacks on Computational Devices 25

Eavesdropping Eavesdropping is the process of secretly listening in on another person’s conversation. Simple eavesdropping techniques include – Using social engineering to allow the attacker to read information over the victim’s shoulder – Installing small cameras to capture the information as it is being read – Using binoculars to view a victim’s monitor through an open window. These direct observation techniques are commonly referred to as shoulder surfing. 26

Signal Emanations Computer screens emit radio frequencies that can be used to detect what is being displayed. Visible light reflections can also be used to reconstruct a display from its reflection on a wall, coffee mug, or eyeglasses. Both of these require the attacker to have a receiver close enough to detect the signal. 27

Acoustic Emissions 28 Dmitri Asonov and Rakesh Agrawal published a paper in 2004 detailing how an attacker could use an audio recording of a user typing on a keyboard to reconstruct what was typed. microphone to capture keystroke sounds sound recording device – Each keystroke has minute differences in the sound it produces, and certain keys are known to be pressed more often than others. – After training an advanced neural network to recognize individual keys, their software recognized an average 79% of all keystrokes. Dmitri Asonov, Rakesh Agrawal: "Keyboard Acoustic Emanations","Keyboard Acoustic Emanations" IEEE Symposium on Security and Privacy, Oakland, California, May 2004.

Hardware Keyloggers A keylogger is any means of recording a victim’s keystrokes, typically used to eavesdrop passwords or other sensitive information. For example, a USB keylogger is a device containing male and female USB connectors, which allow it to be placed between a USB port on a computer and a USB cable coming from a keyboard. – Attackers can secretly get in, plug in, get it out later. 29 USB Keylogger