02.03.2018 Views

Sybex CEH Certified Ethical Hacker Version 8 Study Guide

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

406 Chapter 17 ■ Physical Security<br />

Lock-picking tools are readily available all over the Internet, including sites<br />

such as eBay and http://wallofsheep.com, where they can be purchased<br />

along with training materials on how to use them. Despite their availability,<br />

be careful when you purchase such devices, no matter what the reason.<br />

Different states and different jurisdictions look at the possession of these<br />

tools differently. In California, for example, possession of these tools is<br />

not a crime, but committing a crime with them would be punishable by fines<br />

or jail time.<br />

However, in Nevada possession of these tools alone is against the law<br />

whether or not a separate crime was committed. In states such as Nevada the<br />

concept of prima facie comes into play; simply put, in these states an officer<br />

discovering these tools can place an individual under arrest.<br />

Contactless cards do not require the card to be inserted or slid through a reader. These<br />

devices function by detecting the proximity of the card to the sensor. An example of this<br />

technology is radio frequency ID (RFID), an extremely small electronic device that contains<br />

a microchip and antenna. Many RFID devices are passive. Passive devices have no battery<br />

or power source because they are powered by the RFID reader. The reader generates an<br />

electromagnetic signal that induces a current in the RFID tag.<br />

Another form of authentication is biometrics. Biometric authentication is based on<br />

a behavioral or physiological characteristic that is unique to an individual. Biometric<br />

authentication systems have gained market share and are seen as a good replacement for<br />

password-based authentication systems. Different biometric systems have varying levels of<br />

accuracy. The accuracy of a biometric device is measured by the percentages it produces of<br />

two types of errors. The false rejection rate (FRR) is a measurement of the percentage of<br />

individuals who should have gotten in but were not allowed access. The false acceptance<br />

rate (FAR) is a measurement of the percentage of individuals who gained access but should<br />

not have been allowed in. The corresponding individual errors are also known as type<br />

1 and type 2 errors.<br />

Some common biometric systems include the following:<br />

Finger Scan Systems Widely used and quite popular, these systems are installed in many<br />

new laptops.<br />

Hand Geometry Systems Accepted by most users, these systems function by measuring<br />

the unique geometry of a user’s fingers and hand to identify them.<br />

Palm Scan Systems These are much like the hand geometry systems, except they measure<br />

the creases and ridges of a user’s palm for identification.<br />

Retina Pattern Systems These systems, which examine the user’s retina pattern, are very<br />

accurate.<br />

Iris Recognition This eye recognition system is also very accurate; it matches the person’s<br />

blood vessels on the back of the eye.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!