19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

84<br />

Part II: Putting Ethical Hacking in Motion<br />

Pinpointing Physical Vulnerabilities<br />

in Your Office<br />

Many potential physical security exploits seem unlikely, but they can occur<br />

to organizations that don’t take physical security seriously. The bad guys<br />

can exploit many physical security vulnerabilities, including weaknesses in a<br />

building’s infrastructure, office layout, computer-room access, and design. In<br />

addition to these factors, consider the facility’s proximity to local emergency<br />

assistance (police, fire, and ambulance) and the area’s crime statistics (burglary,<br />

breaking and entering, and so on) so you can better understand what<br />

you’re up against.<br />

Look for the vulnerabilities discussed in the following sections when assessing<br />

your organization’s physical security. This won’t take a lot of technical<br />

savvy or expensive equipment. Depending on the size of your facilities,<br />

these tests shouldn’t take much time either. The bottom line is to determine<br />

whether the physical security controls are adequate given what’s at stake.<br />

Above all, be practical and use common sense.<br />

Building infrastructure<br />

Doors, windows, and walls are critical components of a building — especially<br />

for a computer room or an area where confidential information is stored.<br />

Attack points<br />

Hackers can exploit a handful of building infrastructure vulnerabilities.<br />

Consider the following commonly overlooked attack points:<br />

✓ Are doors propped open? If so, why?<br />

✓ Can gaps at the bottom of critical doors allow someone using a balloon<br />

or other device to trip a sensor on the inside of a “secure” room?<br />

✓ Would it be easy to force doors open? A simple kick near the doorknob<br />

is usually enough for standard doors.<br />

✓ What is the building or data center made of (steel, wood, concrete), and<br />

how sturdy are the walls and entryways? How resilient is the material to<br />

earthquakes, tornadoes, strong winds, heavy rains, and vehicles driving<br />

into the building? Would these disasters leave the building exposed so<br />

that looters and others with malicious intent could gain access to the<br />

computer room or other critical areas?<br />

✓ Are any doors or windows made of glass? Is this glass clear? Is the glass<br />

shatterproof or bulletproof?

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!