19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 6: Physical Security<br />

A Q&A on physical security with Jack Wiles<br />

In this Q&A session, Jack Wiles, an information<br />

security pioneer with over 30 years of experience,<br />

answers several questions on physical<br />

security and how a lack of it often leads to information<br />

insecurity.<br />

How important do you think physical security<br />

is in relation to technical-security issues?<br />

JW: I’ve been asked that question many times in<br />

the past, and from decades of experience with<br />

both physical and technical security, I have a<br />

standard answer. Without question, many of the<br />

most expensive technical-security countermeasures<br />

and tools often become worthless when<br />

physical security is weak. If I can get my team<br />

into your building(s) and walk up to someone’s<br />

desk and log in as that person, I have bypassed<br />

all your technical-security systems. In past security<br />

assessments, after my team and I entered a<br />

building, we always found that people simply<br />

thought that we belonged there — that we were<br />

employees. We were always friendly and helpful<br />

when we came in contact with real employees.<br />

They would often return the kindness by helping<br />

us with whatever we asked for.<br />

How were you able to get into most of the<br />

buildings when you conducted “red team”<br />

penetration tests for companies?<br />

JW: In many cases, we just boldly walked into<br />

the building and went up the elevator in multistory<br />

buildings. If we were challenged, we<br />

always had a story ready. Our typical story was<br />

that we thought that this was the HR department,<br />

and we were there to apply for a job. If<br />

we were stopped at the door and told which<br />

building to go to for HR, we simply left and<br />

then looked for other entrances to that same<br />

building. If we found an outside smoking area<br />

at a different door, we attempted tailgating<br />

and simply walked in behind other employees<br />

who were reentering the building after finishing<br />

their breaks. Tailgating also worked at most<br />

entrances that required card access. In my<br />

career as a red-team leader, we were never<br />

stopped and questioned. We simply said “thank<br />

you” as we walked in and compromised the<br />

entire building.<br />

What kinds of things would you bring out of a<br />

building?<br />

JW: It was always easy to get enough important<br />

documentation to prove that we were there. In<br />

many cases, the documentation was sitting in a<br />

recycle box next to someone’s desk (especially<br />

if that person was someone important). To us,<br />

that really said, “Steal me first!” We found it<br />

interesting that many companies just let their<br />

recycle boxes fill up before emptying them.<br />

We would also look for a room where strip-cut<br />

shredders were used. The documents that were<br />

shredded were usually stored in clear plastic<br />

bags. We loaded these bags into our cars and<br />

had many of the shredded documents put back<br />

together in a few hours. We found that if we<br />

pasted the strips from any page on cardboard<br />

with as much as an inch of space between the<br />

strips, the final document was still readable.<br />

Jack Wiles is president of TheTrainingCo.<br />

(www.thetrainingco.com) and promotes<br />

the annual information security conference<br />

Techno Security.<br />

83

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!