19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

86<br />

Part II: Putting Ethical Hacking in Motion<br />

✓ Where are fire-detection and -suppression devices — including alarm<br />

sensors, extinguishers, and sprinkler systems — located? Determine<br />

how a malicious intruder can abuse them. Are they accessible via a wireless<br />

or local network with default login credentials? Are these devices<br />

placed where they can harm electronic equipment during a false alarm?<br />

✓ Where are water and gas shutoff valves located? Can you access them,<br />

or would you have to call maintenance personnel when an incident<br />

arises?<br />

✓ Are local telecom wires (both copper and fiber) that run outside of the<br />

building located aboveground, where someone can tap into them with<br />

telecom tools? Can digging in the area cut them easily? Are they located<br />

on telephone poles that are vulnerable to traffic accidents or weatherrelated<br />

incidents?<br />

Countermeasures<br />

You might need to involve other experts during the design, assessment, or<br />

retrofitting stages. The key is placement:<br />

✓ Ensure that major utility controls are placed behind closed and lockable<br />

doors or fenced areas out of sight to people passing through or nearby.<br />

✓ Ensure that someone walking through or near the building cannot<br />

access the controls to turn them on and off.<br />

Security covers for on/off switches and thermostat controls and locks for<br />

server power buttons, USB ports, and PCI expansion slots can be effective<br />

defenses. Just don’t depend on them fully, because someone with a hammer<br />

can easily crack them open.<br />

I once assessed the physical security of an Internet colocation facility for a<br />

very large computer company. I made it past the front guard and tailgated<br />

through all the controlled doors to reach the data center. After I was inside,<br />

I walked by equipment that was owned by very large companies, such as<br />

servers, routers, firewalls, UPSs, and power cords. All this equipment was<br />

completely exposed to anyone walking in that area. A quick flip of a switch or<br />

an accidental trip over a network cable dangling to the floor could bring an<br />

entire shelf — and a global e-commerce system — to the ground.<br />

Office layout and usage<br />

Office design and usage can either help or hinder physical security.<br />

Attack points<br />

Hackers might exploit some office vulnerabilities. Consider these attack points:

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!