16.05.2014 Views

Wireless Security.pdf - PDF Archive

Wireless Security.pdf - PDF Archive

Wireless Security.pdf - PDF Archive

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

RFID <strong>Security</strong> 645<br />

building and to enter different rooms within the building. Like most of these<br />

types of systems, the card number is associated with the database containing the<br />

cardholder’s name and the areas they are allowed to access. When the cardholder<br />

passes the card over the reader antenna associated with each door, the system<br />

looks in the database and makes a decision based on the privileges associated with<br />

that card.<br />

Proximity cards are issued when an employee begins a new job, and are collected<br />

when the employee leaves the company. At this particular agency, the personnel<br />

department is responsible for issuing and collecting cards. Therefore, they<br />

implemented a policy that imposes a fine on employees that lose their card.<br />

In one case, an employee lost a card, but did not report it to his superiors because<br />

he did not want to pay a fine. As a relatively low-level employee, reporting the loss<br />

and paying the fine would create a financial hardship.<br />

The proximity card is the least costly part of the RFID-controlled entry system.<br />

However, because of a policy designed to discourage losing the cards, the entire<br />

building security could easily be compromised if someone found that particular<br />

card. The goal of securing physical access to the building was forgotten when the<br />

cost of the card replacement began to drive the policy. The people who wrote the<br />

policy assumed that if an employee lost a card, they would pay the fine.<br />

At another agency, the people using the system issue the cards and control physical<br />

access to the building, taking great effort to password-protect the workstations<br />

that access the database. However, sometimes they forget to physically protect<br />

the control system. The RS-232 serial ports that directly control the system and<br />

the cables to each controlled door are accessible by anyone who wanders into the<br />

room. The room itself is accessible via an unlocked door to a room where visitors<br />

are allowed to roam unescorted.<br />

This particular agency lacks policies regarding installing security equipment, the<br />

areas to secure, and the inability to fully understand the system, which all add up<br />

to a potential failure.<br />

Review your policies and keep focused on the goal. Remember to asked questions<br />

like, “ Are we trying to secure a building, or are we concerned about buying new<br />

cards? ” “ Are we leaving parts of a system vulnerable just because they are out of<br />

sight? ” “ Will people follow or evade this policy? ”<br />

www.newnespress.com

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!