Holes Plugging Access Control Systems Network Wireless Security
























- Slides: 24
Holes – Plugging Access Control Systems Network & Wireless Security Gaps Ron Lander, CPP & Lew Wagner, CPP, CISSP ASIS International Information Technology Security Council rlander@ultra-safe. com lew. wagner@comcast. net Copyright August 22, 2007
What? Me worry? EACP Pass & ID CCTV BMS PIR Shatter Sensor Network War. Driving Sniffing Social Engineering Wep. Crack Air. Snort Kismet Net. Stumbler
Introduction u u u Purpose Physical Security-The Network Link Threats to Physical Security Control Systems Electronic Safeguards for Physical Security Systems Case Studies u u u Technical Human Conclusion
Purpose u Inform - Provide you with key threats, safeguards, and examples u To help you analyze and make more informed decisions on: u Current in-place physical security environments and u Planned/future security control system initiatives
Physical Security-The Network Link u u CCTV, Intrusion Detection, Balance Magnetic Switches (BMSs), Electronic Access Control Points (EACPs), and swipe cards secure our perimeter and environment from unwanted physical intrusion All are currently managed & controlled with computers This electronic control is often over wireless and network pathways If these pathways are compromised, then physical security controls can be easily circumvented
Threats to Physical Security Control Systems
Threats - Technical u Wireless u Plain Text “Eavesdropping” u WEP Encryption Busting u Sniffing over the airwaves u Sensor “Hijacking”
“Sniffing” over Airwaves
Warchalking/Wardriving
Threats-Technical u Network u Entry via excessive electronic access permissions u Compromising “trusted” connection systems
Hooking up to uncontrolled network wall jacks
Physically exposed network junctions, entry points & routes
Threats - Human u Abusing Reception Office network access points u Tailgating u Personnel List Mining u User Group Socializing
Social Engineering…
Shoulder “surfing”…
Target “mapping” via Internet research
Safeguards for Physical Security Systems u Make sure your Access and Security Software providers have proven and updatable layers of security u Have the latest version of your Access and Security Software u Off-site copies of all software programs u Plan for contingency during virus or external attack u Plan your response and test the plan
Safeguards for Physical Security Systems (Cont. ) u Ensure wireless communications are using at least WPA-2. Recommend temporal time rekeying of password with each network packet sent u Strong encryption key using authentication as well u Run tools like Air Defense & Air Magnet to help secure wireless network
Safeguards for Physical Security Systems (Cont. ) u Run network-based intrusion detection to spot abnormal patterns in traffic related to physical security systems u Shield emanations if required by US Govt. in protected cable runs
Case Studies
Access Control - Physical u u u u Military (Sensors screaming – no one listening) IT Technology Firm (telephony router “piggy backing”) Parking Unit (CCTV hijacking) Web Organization (swipe card mayhem) Telecommunications Company (reception room tap) Medical Center (EACP cleartext, patient info, wardriving) Fast Food Chain (Overriding drive-thru wireless)
Access Control – Physical & Human attacks u Expositions… (“insecure” security trade shows)
Conclusion u u u You are as strong as your weakest (technological) point!!! Step out of the BOX and take a look inside Recognize that there are people who WANT your corporate information
Contact Information u Ron Lander: u Ch. Specialist, Ultra-Safe Security Solutions u rlander@ultra-safe. com (E-Mail) u (909) 288 -5260 (Cell Phone) u Lew Wagner: u Pres & CEO, Dynamic Defense In Depth, Inc. u lwagner 6@houston. rr. com (E-Mail) u (317) 502 -1667 (Cell Phone)