02.03.2018 Views

Sybex CEH Certified Ethical Hacker Version 8 Study Guide

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Introducing Physical Security 407<br />

Voice Recognition This system determines who you are by using voice analysis.<br />

Keyboard Dynamics This biometric method analyzes the user’s speed and pattern of<br />

typing.<br />

No matter what means of authentication you use as a physical access control, it needs<br />

to fit the situation in which it will be applied. For example, if the processing time of a<br />

biometric system is slow, users will tend to just hold the door open for others rather than<br />

wait for the additional processing time. Another example is iris scanners, which may be<br />

installed at all employee entrances, yet later cause complaints from employees who are<br />

physically challenged or in wheelchairs since they cannot easily use the newly installed<br />

system. Consider who will be using the system and if it may be appropriate given the<br />

situation and user base.<br />

Walls, Ceilings, and Floors<br />

Of course surrounding any facility and rooms are the walls, ceilings, and floors, which<br />

you should always consider when doing a physical penetration or assessment. Walls can<br />

be constructed and designed many different ways, but each situation should be considered<br />

carefully and assessed by someone who knows the various details that must be taken<br />

into account.<br />

First, look at the construction and composition of walls. Walls protecting key rooms<br />

within a facility should be sturdy and provide an effective barrier as well as a strong point<br />

for anchoring doors.<br />

One often overlooked point is whether the walls are constructed as so-called “false”<br />

walls or if they are actually fully constructed. In some facilities, the walls may not extend<br />

up beyond the ceiling, which may not seem like a problem normally. However, in some<br />

cases facilities employ what is known as a false ceiling, which is a wall that only goes up to<br />

a drop ceiling and does not extend past the drop ceiling to the roof of the building. In cases<br />

like this, it is possible for an intruder to gain access to a restricted area simply by entering a<br />

crawlspace and going over the wall.<br />

In addition, any ceiling-mounted air ducts should be small enough to prevent an intruder<br />

from crawling through them.<br />

One other area to consider is that area under your feet, the floor. In some buildings the<br />

floor is actually raised, meaning there exists a space underneath it. This space can present<br />

problems up to and including the passage of intruders or the placement of listening devices<br />

or other equipment.<br />

Finally, something that may not seem as obvious is how to protect facilities against<br />

vehicles. For example, how can a car or truck be stopped from backing into a window<br />

breaking it and allowing an intruder to quickly run in and steal something? The answer<br />

is bollards. Bollards are metal or rock barriers designed to thwart a vehicle-based attack.<br />

When a vehicle hits one of these devices it will be stopped by the bollard and cannot be<br />

used to crash into a building, much like a battering ram.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!