19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 6: Physical Security<br />

✓ Does a receptionist or security guard monitor traffic in and out of the<br />

main doors of the building?<br />

✓ Do employees have confidential information on their desks? What about<br />

mail and other packages — do they lie around outside someone’s door<br />

or, even worse, outside the building, waiting for pickup?<br />

✓ Where are trash cans and dumpsters located? Are they easily accessible<br />

by anyone? Are recycling bins or shredders used?<br />

Open recycling bins and other careless handling of trash are invitations<br />

for dumpster diving. Hackers search for confidential company information,<br />

such as phone lists and memos, in the trash. Dumpster diving can<br />

lead to many security exposures.<br />

✓ How secure are the mail and copy rooms? If intruders can access these<br />

rooms, they can steal mail or company letterhead to use against you.<br />

They can also use and abuse your fax machine(s).<br />

✓ Are closed-circuit television (CCTV) or IP-based network cameras used<br />

and monitored in real time?<br />

✓ Have your network cameras and digital video recorders (DVRs) been<br />

hardened from attack — or at least have the default login credentials<br />

been changed? This is a security flaw that you can predict with near<br />

100-percent certainty.<br />

✓ What access controls are on doors? Are regular keys, card keys, combination<br />

locks, or biometrics used? Who can access these keys, and where<br />

are they stored?<br />

Keys and programmable keypad combinations are often shared among<br />

users, making accountability difficult to determine. Find out how many<br />

people share these combinations and keys.<br />

I came across a situation for a client where the front lobby entrance was<br />

unmonitored. It also happened to have a Voice over IP (VoIP) phone available<br />

for anyone to use. But the client did not consider that anyone could enter the<br />

lobby, disconnect the VoIP phone (or use the phone’s data port), and plug<br />

a laptop computer into the connection and have full access to the network<br />

with minimal chance that the intruder would ever be questioned about what<br />

he or she was doing. This could have been prevented had a network connection<br />

not been made available in an unmonitored area, if separate data and<br />

voice ports were used, or if the voice and data traffic had been separated at<br />

the network level.<br />

Countermeasures<br />

What’s challenging about physical security is the fact that security controls<br />

are often reactive. Some controls are preventive (that is, they deter, detect,<br />

or delay), but they’re not foolproof. Putting simple measures, such as the following,<br />

in place can help reduce your exposure to building and office-related<br />

vulnerabilities:<br />

87

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!