Time
8 hours 53 minutes
Difficulty
Beginner
CEU/CPE
11

Video Transcription

00:00
finally, in this model, let's look at physical security,
00:04
and this is important because all the other security that we implement
00:09
can be circumvented by poor physical security.
00:13
For example,
00:15
all the security you have put in around your documents and applications and installing anti virus software and so on
00:25
is not much. Use that someone can wander into your office and just walk out with your desktop computer, your laptop or even your smartphone.
00:34
Someone steals a copy of a backup.
00:37
So you have been meticulous about doing regular backups of all of your documents, which is a good thing.
00:42
But then you leave the backups lying around.
00:45
Somebody walks off with it. Now they have a copy of all of your documents.
00:50
Denial of service attacks? Well, in one sense, Donal denial of service attacks up fairly sophisticated attacks launched across the Internet to attack your network and bring down certain servers. That's why it's called denial of service.
01:04
But denial of service attacks can be very simple.
01:08
For example, if your company leaves its server room unlocked,
01:14
a malicious user could wander in there.
01:17
They could unplug the cables from the back of the servers, disconnecting them from the network.
01:22
They've just done a denial of service attack
01:25
or
01:26
that could wander in there with a hammer and just smash your stuff to bits.
01:30
So physical security is important, obviously
01:36
sort of implement physical security doors and locks need to be in place.
01:41
Access to any sensitive areas like of server room or any other sensitive part of your organization
01:47
should be guarded by locked doors, cameras, security guards and so on.
01:53
You can provide secure access to certain parts of the building by having keypads, where users have to enter a pin
02:00
or bots that locked doors or biometric devices like fingerprint scanners.
02:06
You can have turnstiles so user, your staff have to scan a card, and then they can walk through the turnstile.
02:14
You can have man traps, which are more sophisticated, because one of the problems that turn styles on other types of doors is tailgating, which we'll get to in a minute.
02:23
But what a man trapped as is it has a Korea's a short corridor with doors at either end
02:30
to get through the first door. Maybe you scan your fingerprint, the door opens, you get into their little corridor,
02:36
and then the door Shuts
02:38
wanted his shut. You couldn't then go to the second door and again scan your fingerprint on. Get through that.
02:43
Meanwhile, they have a camera that monitors that small corridor, so there's a visual record of everyone who passed through
02:51
requiring. Logging simply means that users should be required to sign in when entering secure locations.
03:00
So what is tailgating? Tailgating is when someone walks right behind you
03:04
so either to get through a turnstile or through a secure door.
03:07
So you walk up to a secure door, you enter your pin
03:10
and someone's right behind you and follows you as you open the door.
03:15
And most of us are too polite to turn around and say to the person, Hate,
03:20
no, you wait until I'm through and the door closes, and then you have to enter the pin yourself
03:25
on. So that's something you have to be aware off because tailgating can be done very commonly, and most people will not try and stop it from happening.
03:38
To protect your devices,
03:40
desktop computer cases can be locked and intrusion intrusion detection enabled within the bios of the computer.
03:50
So what there is is a small switch in the case, so if anyone takes the side panel off
03:54
that
03:55
indicates that it's been opened.
03:59
The next time you log on, you'll get in intrusion detection message saying somebody opened your computer case
04:04
So that's important, because what were they doing? Maybe they opened it to steal your hard disk or to replace it, or maybe install something like a hardware key logger.
04:15
The key logger records all your key presses, and then they come and retrieve that later on.
04:24
What about laptops? And the problem with laptops is it's very easy to walk off with them.
04:29
So laptops have this thing called the Kensington Lock Point,
04:32
and you can then get steel cables that you attach to the Kensington Lock Point
04:38
that may be attached to a table. So it's not so easy to walk up with the laptop. In that case,
04:47
it's a shoulder. Surfing refers to someone standing behind you as you type in your password,
04:53
and they're watching carefully and note down what your password waas as you typed it in.
04:59
Similarly, if you have one of the secure doors where you have to enter a pin to get through the door,
05:04
somebody could be standing right behind you and noting the pin that you type in into the keypad
05:13
dumpster diving. So one of the things we've mentioned throughout this module is reconnaissance Many times before there's an attack on your network. They need to gather a lot of information about the organization,
05:25
and it's this network if they can.
05:28
So one way of doing that is searching through the waste thrown out in the garbage.
05:33
You can that case find e mails, find letters on even
05:41
find copies off the company directory
05:44
with the names of all your members of staff, their jobs, possibly the job title that telephone numbers, email addresses and so on.
05:54
This could then be used in spear phishing attacks. So if you remember, spearfishing is when, instead of randomly targeting people with email,
06:02
you target specific users like, say, somebody in the Finance Department, and then you send them an email that they will open because you say the email. This contains an invoice or contains a receipt.
06:15
So one of the ways you would find out was working in the Finance Department is if you go dumpster diving and find a copy of the company directory
06:24
so sensitive. Documents should always be shredded rather than just thrown out into the dumpster
06:31
and
06:32
also be aware.
06:33
But CDs DVDs that may have been created, for example, is backups
06:40
and hard disks.
06:42
If you just throw those out, people could recover data from those,
06:46
so these should be physically destroyed. So CDs and DVDs should be destroyed Now hard drives you can either securely erased them using a number of methods.
06:57
Or you should physically destroy the hard disk. You can drill holes through it or smash it with a hammer or something like that.
07:02
But
07:04
secure it. Raising
07:06
means actually wiping the data off it,
07:11
because there is one thing you need to know. And that is, if you delete a file on the hard disk, it doesn't actually get deleted. It's left intact on the hard disk. Instead,
07:20
the indexing system in the file system simply removes the pointer to that file.
07:26
So if I do the following, if I'm about to give away the computer to someone
07:31
and I go into the hard drive and I delete all my files
07:35
and that's all I do
07:38
when they get home, they could use certain types of software that will scan the disk and find all those allegedly deleted files.
07:46
So a secure raising process does this. All those areas of the disk that contains thes allegedly deleted files
07:56
is over it multiple times so that they cannot be read.
08:00
You can also get hardware devices that fire very powerful magnetic fields at the hard disk, basically wiping out everything on it.
08:07
So there are various ways off securely disposing off things like CDs and hard drives
08:18
for software provided on CDs or DVDs. The box may contain stickers with the license number or product code.
08:26
This could be used by someone to install illegal copies of the software.
08:31
Um,
08:33
because getting the actual software's not difficult. Very often it could be downloaded from the Internet.
08:39
And then when you get to the screen where it prompts you for the license number or product key,
08:43
well, if they copied yours, they could enter that.
08:48
So for those reasons, do not print out licenses or store them in unprotected digital files on the network where people could get to them.
09:00
So to summarize, Model 3.1 defined basic security threats
09:05
in this module. We started by looking at basic security principles such as defence in depth on the trade off between security and ease of use.
09:15
We looked at social engineering tricks that I used to get information as well as dumpster diving.
09:20
Social engineering may be carried out during the reconnaissance phase when the attacker just trying to gather as much information about the target as possible.
09:30
That information is used to figure out the best way to attack the network.
09:33
Finally, we noted that if you don't have good physical security,
09:37
many other security measures can be undermined.

Up Next

CompTIA IT Fundamentals

The CompTIA IT Fundamentals certification is aimed at people considering a career change to IT. The course will prepare you to take the CompTIA IT Fundamentals exam. If you are new to IT this course is prerequisite knowledge that allows you to tackle the more advanced A+ and Network+ CompTIA certifications that many IT professionals hold.

Instructed By

Instructor Profile Image
Ali Wasti
Instructor