Physical Security Slides from Michael Goodrich & Roberto Tamassia’s “Introduction to Computer Security”

Slides:



Advertisements
Similar presentations
ATM SCAM At first glance it would appear as though this individual is simply performing a simple ATM transaction.
Advertisements

PRESENTED BY: FATIMA ALSALEH Credit Cards Fraud - skimmers -
Expand Media Wall & Podium Case Training Video’s & Instructions.
CAMERA CARE + SAFETY. I. Equipment Storage Cameras are numbered and stored in the numbered pockets in the equipment closet Lenses are numbered and stored.
Corning Cabelcon 1. 2 To begin with – we need some tools… Cable cutter Cabelcon RG11 Rotary Stripper Mounting tools Compression tool Please read the instructions.
ICT at Work Banking and Finance.
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
1. 2 Someone steals your personal information to commit fraud. A “buy now, pay never” shopping experience. What is Identity Theft?
ATM THEFTS  In our first slide you see an individual who apparently is making a bank transaction at the ATM.
Register Disbursement Schemes
Direct Attacks on Computational Devices
Presented By The Plano Police Department Crime Prevention Unit.
Warm-up: April 11 What’s the difference between a checking and savings account?
Debit Card Plastic card that looks like a credit card
Specification section 3.3
ATM Security Recommendations. n There are over 200,000 ATMs in the U.S. n Cash in ATMs ranges from $15,000 in small machines to $250,000 in larger bank.
ATM THEFTS  In our first slide you see an individual who apparently is making a bank transaction at the ATM.
Electronic ATM Fraud. ATM Fraud is where you goto an ATM and you insert your card into a skimmer which is placed in the card slot and it will take all.
CP1610: Introduction to Computer Components
Be careful when you use your ATM Card See how it was done in Oman.
UK Fraud Perspective The National Fraud Intelligence Bureau (NFIB) Wendy Aldridge Intelligence Analyst National Fraud Intelligence Bureau
By Kieran and Zak.  The Lebanese fraud is when.a loop of tape is inserted in to the card slot.the customer inserts card and the x- ray film tape is put.
ATM THEFTS  In our first slide you see an individual who apparently is making a bank transaction at the ATM.
CARD THEFT USING ATMS PERSONAL OPSEC. ATM THEFTS  In the first slide you see an individual who appears to be making a bank transaction at the ATM.
A bar enabling to register the PIN (placed above the ATM keyboard) A skimming bar with an opening for the anti-skimming extension of Ceska Sporitelna (attached.
Water jacket to air box crack completed Lower bore repair side A2 needs two more pins and finish work.
AS Level ICT Selection and use of input devices and input media: Capturing transaction data.
GCSE Information Technology Input Devices and Methods Objectives:  To understand what input devices are.  Identify their individual uses  Be able to.
By: Piyumi Peiris 11 EDO. Swipe cards are a common type of security device used by many people. They are usually a business-card-sized plastic card with.
Identity Theft Your Problem, Not Mine. What can an identity thief do with your info? 1. Apply for a new driver’s license 2. Open a new bank account and.
DEBIT CARD, CREDIT CARD & SMART CARD
Electronic Payment Systems
Setting up the Ricoh C305 Press F5 to start the Presentation
ATM ROBBERY  In first instance, there is a person who apparently is making a transaction at the ATM. Translated by: S.L. de Sánchez.
Wire and spinning magnets Reference: Original Authur: William Beaty 1996.
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
August 19 & 22, Objectives  Identify adequate, reliable information resources for personal and family problem solving.  Explore ways to prevent.
Cashless Society E-Learning 1 (31 st Jan – 1 st Feb 2008)
Hello there, Welcome to your Year 8 CAD / CAM project What does CAD and CAM mean? CAD - Computer Aided Design CAM - Computer Aided Manufacture Introduction.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
DS200 PROCEDURES SPEAKER TOUCH SCREEN DISPLAY
ATM Fraud. Lost/stolen cards The Lost or Stolen physical card is becoming less of a target The data that can be skimmed is much more valuable and any.
Making A Paper Bag Cover Cut open a brown paper shopping bag, the kind you get at the grocery store. Start by cutting down one corner, from top to bottom,
IDENTITY THEFT Seneca Stairs. #1- Phishing  Phishing is when you get an from someone claiming to be an agency that you have an account in.  They.
8.02 Discuss considerations for safety and security.
Introduction What would our society be like now if we did not have ATm’s? Not able to access money when we urgently want it. You will have to go to the.
PostBase Automatic Feeder Component Removal Service Training
Presented By: Mark Jordan
Scorpion is a remote tester specifically designed for testing ASD systems. Scorpion is compatible with the FAAST aspirating smoke detector. It is particularly.
No Solder Battery Interrupter
ATM SCAM At first glance it would appear as though this individual is simply performing a simple ATM transaction.
SECURITY FEATURES OF ATM
SPIRAL NOTE: Normal colour mixing applies. Lay your material on a flat surface. Place your thumb and a couple of fingers on the cloth.
ATM THEFTS In our first slide you see an individual who apparently is making a bank transaction at the ATM.
How An ATM Work's Prepaid by, kakani Dinesh.
Accu-Vote Tabulator Preparation
ATM SCAM At first glance it would appear as though this individual is simply performing a simple ATM transaction.
ATM THEFTS In our first slide you see an individual who apparently is making a bank transaction at the ATM.
ATM THEFTS In our first slide you see an individual who apparently is making a bank transaction at the ATM.
ATM THEFTS In our first slide you see an individual who apparently is making a bank transaction at the ATM.
T-POD Read the text..
ATM THEFTS In our first slide you see an individual who apparently is making a bank transaction at the ATM.
Installation guide for RG6/59 compression connectors
Installation guide for CX3 RG 7/11 compression connectors
ATM THEFTS In our first slide you see an individual who apparently is making a bank transaction at the ATM.
I am about to give you a lot of information.
Codon Wheel/tRNA passer mRNA mover
How To Avoid Being A Victim
ATM THEFTS In our first slide you see an individual who apparently is making a bank transaction at the ATM.
Presentation transcript:

Physical Security Slides from Michael Goodrich & Roberto Tamassia’s “Introduction to Computer Security”

Basically: any user who has access to any lock in the system and a working key to that lock can fairly easily reverse engineer the Grand Master Key that opens all locks in the system

Shoulder Surfing

Credit Card Skimmer 73 Skimming is the theft of credit card information used in an otherwise legitimate transaction http://wp.me/P29YQz-k http://telecommunication.itb.ac.id/~tutun/ET4085

First trick 74 A credit card “skimmer” is mounted to the front of the normal ATM card slot which reads the ATM card number and either stores or transmits the number to the scammers. Once in place it’s very difficult to tell that a skimmer is attached to the ATM machine. Any cards used in this machine will have their magnetic strip recorded and the scammers will be able to use this information to create a “clone” of this card using a magnetic strip writer http://www.expandmywealth.com/category/credit-cards/ http://telecommunication.itb.ac.id/~tutun/ET4085 http://wp.me/P29YQz-k

75 The scammers can take things even further and install a pamplet box containing a concealed camera to record the user’s PIN number http://www.expandmywealth.com/category/credit-cards/ http://wp.me/P29YQz-k http://telecommunication.itb.ac.id/~tutun/ET4085

The Lebanese Loop Trick the cut The Lebanese Loop consist of a strip or sleeve of metal or plastic (such as x-ray film or VCR tape) that is inserted into the ATM’s card slot The ends of the strip are folded upwards. The foldered ends are glued to the outer surface of the ATM card slot, making the Lebanese Loop virtually impossible to detect Slits are cut on both sides of the Lebanese Loop to prevent the card from being returned at the end of the transaction. This causes the card to remain in the machine. Once the ATM user leaves the scammer can now return to the machine and pull down the ends of the loop to retrieve the ATM card and remove it from the slot. The scammer now has the ATM card and is free to use it provided he was able to record or view the user entering in their PIN number http://www.expandmywealth.com/category/credit-cards/ http://wp.me/P29YQz-k