Physical Security Slides from Michael Goodrich & Roberto Tamassia’s “Introduction to Computer...

76
Physical Security Slides from Michael Goodrich & Roberto Tamassia’s “Introduction to Computer Security”

Transcript of Physical Security Slides from Michael Goodrich & Roberto Tamassia’s “Introduction to Computer...

Physical Security

Slides from Michael Goodrich & Roberto Tamassia’s “Introduction to

Computer Security”

Basically: any user who has access to any lock in the system and a working key to that lock can fairly easily reverse engineer the Grand Master Key that opens all locks in the system

Shoulder Surfing

http://wp.me/P29YQz-k

SKIMMING IS THE THEFT OF CREDIT CARD INFORMATION USED IN AN OTHERWISE

LEGIT IMATE TRANSACTION

73

Credit Card Skimmer

http://telecommunication.itb.ac.id/~tutun/ET4085

73

http://wp.me/P29YQz-k

74

First trick

http://telecommunication.itb.ac.id/~tutun/ET4085

74

A credit card “skimmer” is mounted to the front of the normal ATM card slot which reads the ATM card number and either stores or transmits the number to the scammers.

Once in place it’s very difficult to tell that a skimmer is attached to the ATM machine.

Any cards used in this machine will have their magnetic strip recorded and the scammers will be able to use this information to create a “clone” of this card using a magnetic strip writerhttp://www.expandmywealth.com/category/

credit-cards/

http://wp.me/P29YQz-k

75

http://telecommunication.itb.ac.id/~tutun/ET4085

75

The scammers can take things even further and install a pamplet box containing a concealed camera to record the user’s PIN number http://www.expandmywealth.com/category/

credit-cards/

http://wp.me/P29YQz-k

The Lebanese Loop Trick76

The Lebanese Loop consist of a strip or sleeve of metal or plastic (such as x-ray film or VCR tape) that is inserted into the ATM’s card slot

The ends of the strip are folded upwards. The foldered ends are glued to the outer surface of the ATM card slot, making the Lebanese Loop

virtually impossible to detect Slits are cut on both sides of the Lebanese Loop to prevent the card from being returned at the

end of the transaction. This causes the card to remain in the machine. Once the ATM user leaves the scammer can now return to the machine and pull down the ends of

the loop to retrieve the ATM card and remove it from the slot. The scammer now has the ATM card and is free to use it provided he was able to record or view

the user entering in their PIN number

the cut

http://www.expandmywealth.com/category/credit-cards/