1 / 0

Physical Security

Physical Security. Slides from Michael Goodrich & Roberto Tamassia’s “Introduction to Computer Security” . Basically: any user who has access to any lock in the system and a working key to that lock can fairly easily reverse engineer the Grand Master Key that opens all locks in the system.

carlo
Download Presentation

Physical Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Physical Security

    Slides from Michael Goodrich & Roberto Tamassia’s “Introduction to Computer Security”
  2. Basically: any user who has access to any lock in the system and a working key to that lock can fairly easily reverse engineer the Grand Master Key that opens all locks in the system
  3. Shoulder Surfing
  4. Credit Card Skimmer 73 Skimming is the theft of credit card information used in an otherwise legitimate transaction http://wp.me/P29YQz-k http://telecommunication.itb.ac.id/~tutun/ET4085
  5. First trick 74 A credit card “skimmer” is mounted to the front of the normal ATM card slot which reads the ATM card number and either stores or transmits the number to the scammers. Once in place it’s very difficult to tell that a skimmer is attached to the ATM machine. Any cards used in this machine will have their magnetic strip recorded and the scammers will be able to use this information to create a “clone” of this card using a magnetic strip writer http://www.expandmywealth.com/category/credit-cards/ http://wp.me/P29YQz-k http://telecommunication.itb.ac.id/~tutun/ET4085
  6. 75 The scammers can take things even further and install a pamplet box containing a concealed camera to record the user’s PIN number http://www.expandmywealth.com/category/credit-cards/ http://wp.me/P29YQz-k http://telecommunication.itb.ac.id/~tutun/ET4085
  7. The Lebanese Loop Trick The Lebanese Loop consist of a strip or sleeve of metal or plastic (such as x-ray film or VCR tape) that is inserted into the ATM’s card slot The ends of the strip are folded upwards. The foldered ends are glued to the outer surface of the ATM card slot, making the Lebanese Loop virtually impossible to detect Slits are cut on both sides of the Lebanese Loop to prevent the card from being returned at the end of the transaction. This causes the card to remain in the machine. Once the ATM user leaves the scammer can now return to the machine and pull down the ends of the loop to retrieve the ATM card and remove it from the slot. The scammer now has the ATM card and is free to use it provided he was able to record or view the user entering in their PIN number the cut http://www.expandmywealth.com/category/credit-cards/ http://wp.me/P29YQz-k
More Related