Holes Plugging Access Control Systems Network Wireless Security

  • Slides: 24
Download presentation
Holes – Plugging Access Control Systems Network & Wireless Security Gaps Ron Lander, CPP

Holes – Plugging Access Control Systems Network & Wireless Security Gaps Ron Lander, CPP & Lew Wagner, CPP, CISSP ASIS International Information Technology Security Council rlander@ultra-safe. com lew. wagner@comcast. net Copyright August 22, 2007

What? Me worry? EACP Pass & ID CCTV BMS PIR Shatter Sensor Network War.

What? Me worry? EACP Pass & ID CCTV BMS PIR Shatter Sensor Network War. Driving Sniffing Social Engineering Wep. Crack Air. Snort Kismet Net. Stumbler

Introduction u u u Purpose Physical Security-The Network Link Threats to Physical Security Control

Introduction u u u Purpose Physical Security-The Network Link Threats to Physical Security Control Systems Electronic Safeguards for Physical Security Systems Case Studies u u u Technical Human Conclusion

Purpose u Inform - Provide you with key threats, safeguards, and examples u To

Purpose u Inform - Provide you with key threats, safeguards, and examples u To help you analyze and make more informed decisions on: u Current in-place physical security environments and u Planned/future security control system initiatives

Physical Security-The Network Link u u CCTV, Intrusion Detection, Balance Magnetic Switches (BMSs), Electronic

Physical Security-The Network Link u u CCTV, Intrusion Detection, Balance Magnetic Switches (BMSs), Electronic Access Control Points (EACPs), and swipe cards secure our perimeter and environment from unwanted physical intrusion All are currently managed & controlled with computers This electronic control is often over wireless and network pathways If these pathways are compromised, then physical security controls can be easily circumvented

Threats to Physical Security Control Systems

Threats to Physical Security Control Systems

Threats - Technical u Wireless u Plain Text “Eavesdropping” u WEP Encryption Busting u

Threats - Technical u Wireless u Plain Text “Eavesdropping” u WEP Encryption Busting u Sniffing over the airwaves u Sensor “Hijacking”

“Sniffing” over Airwaves

“Sniffing” over Airwaves

Warchalking/Wardriving

Warchalking/Wardriving

Threats-Technical u Network u Entry via excessive electronic access permissions u Compromising “trusted” connection

Threats-Technical u Network u Entry via excessive electronic access permissions u Compromising “trusted” connection systems

Hooking up to uncontrolled network wall jacks

Hooking up to uncontrolled network wall jacks

Physically exposed network junctions, entry points & routes

Physically exposed network junctions, entry points & routes

Threats - Human u Abusing Reception Office network access points u Tailgating u Personnel

Threats - Human u Abusing Reception Office network access points u Tailgating u Personnel List Mining u User Group Socializing

Social Engineering…

Social Engineering…

Shoulder “surfing”…

Shoulder “surfing”…

Target “mapping” via Internet research

Target “mapping” via Internet research

Safeguards for Physical Security Systems u Make sure your Access and Security Software providers

Safeguards for Physical Security Systems u Make sure your Access and Security Software providers have proven and updatable layers of security u Have the latest version of your Access and Security Software u Off-site copies of all software programs u Plan for contingency during virus or external attack u Plan your response and test the plan

Safeguards for Physical Security Systems (Cont. ) u Ensure wireless communications are using at

Safeguards for Physical Security Systems (Cont. ) u Ensure wireless communications are using at least WPA-2. Recommend temporal time rekeying of password with each network packet sent u Strong encryption key using authentication as well u Run tools like Air Defense & Air Magnet to help secure wireless network

Safeguards for Physical Security Systems (Cont. ) u Run network-based intrusion detection to spot

Safeguards for Physical Security Systems (Cont. ) u Run network-based intrusion detection to spot abnormal patterns in traffic related to physical security systems u Shield emanations if required by US Govt. in protected cable runs

Case Studies

Case Studies

Access Control - Physical u u u u Military (Sensors screaming – no one

Access Control - Physical u u u u Military (Sensors screaming – no one listening) IT Technology Firm (telephony router “piggy backing”) Parking Unit (CCTV hijacking) Web Organization (swipe card mayhem) Telecommunications Company (reception room tap) Medical Center (EACP cleartext, patient info, wardriving) Fast Food Chain (Overriding drive-thru wireless)

Access Control – Physical & Human attacks u Expositions… (“insecure” security trade shows)

Access Control – Physical & Human attacks u Expositions… (“insecure” security trade shows)

Conclusion u u u You are as strong as your weakest (technological) point!!! Step

Conclusion u u u You are as strong as your weakest (technological) point!!! Step out of the BOX and take a look inside Recognize that there are people who WANT your corporate information

Contact Information u Ron Lander: u Ch. Specialist, Ultra-Safe Security Solutions u rlander@ultra-safe. com

Contact Information u Ron Lander: u Ch. Specialist, Ultra-Safe Security Solutions u rlander@ultra-safe. com (E-Mail) u (909) 288 -5260 (Cell Phone) u Lew Wagner: u Pres & CEO, Dynamic Defense In Depth, Inc. u lwagner 6@houston. rr. com (E-Mail) u (317) 502 -1667 (Cell Phone)