Revision as of 09:45, 25 September 2008 editTinucherian (talk | contribs)Administrators54,321 edits General fixes and clean up using AWB← Previous edit | Latest revision as of 17:53, 3 May 2024 edit undoGoodmans238 (talk | contribs)Extended confirmed users1,266 edits Rescuing 4 sources and tagging 0 as dead.) #IABot (v2.0.9.5Tag: IABotManagementConsole [1.3] | ||
(9 intermediate revisions by 8 users not shown) | |||
Line 1: | Line 1: | ||
{{short description|Ability of people to physically gain access to a computer system}} | |||
'''Physical access''' is a term in ] that refers to the ability of people to physically gain access to a computer system. According to Gregory White, "Given physical access to an office, the knowledgeable attacker will quickly be able to find the information needed to gain access to the organization's computer systems and network."<ref>White, Gregory: Security+ Certification All-in-One Exam Guide, McGraw-Hill, 2003, p. 388.</ref> | |||
==Attacks and countermeasures== | ==Attacks and countermeasures== | ||
===Attacks=== | ===Attacks=== | ||
Physical access opens up a variety of avenues for hacking<ref>, Microsoft.</ref> |
Physical access opens up a variety of avenues for hacking.<ref> {{Webarchive|url=https://web.archive.org/web/20150227084826/http://support.microsoft.com/kb/818200 |date=2015-02-27 }}, Microsoft.</ref> Michael Meyers notes that "the best network software security measures can be rendered useless if you fail to physically protect your systems," since an intruder could simply walk off with a server and crack the password at his leisure.<ref>''Network+ Certification All-in-One Exam Guide'', Michael Meyers, Third Edition, Chapter 17, p. 551, ], 2004.</ref> Physical access also allows ]s to be installed. An intruder may be able to boot from a CD or other external media and then read unencrypted data on the hard drive.<ref> {{Webarchive|url=https://web.archive.org/web/20220622102710/http://www.irongeek.com/i.php?page=security%2Flocalsamcrack |date=2022-06-22 }}, ].</ref> They may also exploit a lack of access control in the ]; for instance, pressing F8 while certain versions of Microsoft Windows are booting, specifying 'init=/bin/sh' as a boot parameter to Linux (usually done by editing the command line in ]), etc. One could also use a rogue device to access a poorly secured wireless network; if the signal were sufficiently strong, one might not even need to breach the perimeter.<ref name="Threats">{{Cite web |url=http://searchsecurity.techtarget.com/generic/0,295582,sid14_gci1238092,00.html |title=Threats to Physical Security |access-date=2007-10-29 |archive-date=2009-08-13 |archive-url=https://web.archive.org/web/20090813043517/http://searchsecurity.techtarget.com/generic/0,295582,sid14_gci1238092,00.html |url-status=live }}</ref> | ||
===Countermeasures=== | ===Countermeasures=== | ||
IT security standards in the ] typically call for physical access to be limited by locked ]s, sign-in sheets, etc. Physical access systems and IT security systems have historically been administered by separate departments of organizations, but are increasingly being seen as having interdependent functions needing a single, converged security policy<ref>, David Ting, TechNewsWorld, November 10, 2006.</ref> |
IT security standards in the ] typically call for physical access to be limited by locked ]s, sign-in sheets, etc. Physical access systems and IT security systems have historically been administered by separate departments of organizations, but are increasingly being seen as having interdependent functions needing a single, converged security policy.<ref> {{Webarchive|url=https://web.archive.org/web/20160303195031/http://www.technewsworld.com/story/54176.html |date=2016-03-03 }}, David Ting, TechNewsWorld, November 10, 2006.</ref> An IT department could, for instance, check ] entries for suspicious logons occurring after business hours, and then use keycard swipe records from a building ] system to narrow down the list of suspects to those who were in the building at that time. ]s might also be used to deter or detect unauthorized access.<ref name="Threats"/> | ||
==References== | ==References== | ||
Line 12: | Line 14: | ||
] | ] | ||
{{compu-stub}} |
Latest revision as of 17:53, 3 May 2024
Ability of people to physically gain access to a computer systemPhysical access is a term in computer security that refers to the ability of people to physically gain access to a computer system. According to Gregory White, "Given physical access to an office, the knowledgeable attacker will quickly be able to find the information needed to gain access to the organization's computer systems and network."
Attacks and countermeasures
Attacks
Physical access opens up a variety of avenues for hacking. Michael Meyers notes that "the best network software security measures can be rendered useless if you fail to physically protect your systems," since an intruder could simply walk off with a server and crack the password at his leisure. Physical access also allows hardware keyloggers to be installed. An intruder may be able to boot from a CD or other external media and then read unencrypted data on the hard drive. They may also exploit a lack of access control in the boot loader; for instance, pressing F8 while certain versions of Microsoft Windows are booting, specifying 'init=/bin/sh' as a boot parameter to Linux (usually done by editing the command line in GRUB), etc. One could also use a rogue device to access a poorly secured wireless network; if the signal were sufficiently strong, one might not even need to breach the perimeter.
Countermeasures
IT security standards in the United States typically call for physical access to be limited by locked server rooms, sign-in sheets, etc. Physical access systems and IT security systems have historically been administered by separate departments of organizations, but are increasingly being seen as having interdependent functions needing a single, converged security policy. An IT department could, for instance, check security log entries for suspicious logons occurring after business hours, and then use keycard swipe records from a building access control system to narrow down the list of suspects to those who were in the building at that time. Surveillance cameras might also be used to deter or detect unauthorized access.
References
- White, Gregory: Security+ Certification All-in-One Exam Guide, McGraw-Hill, 2003, p. 388.
- An attacker with physical access to a computer may be able to access files and other data Archived 2015-02-27 at the Wayback Machine, Microsoft.
- Network+ Certification All-in-One Exam Guide, Michael Meyers, Third Edition, Chapter 17, p. 551, McGraw-Hill Companies, 2004.
- Cracking Windows 2000 And XP Passwords With Only Physical Access Archived 2022-06-22 at the Wayback Machine, Irongeek.
- ^ "Threats to Physical Security". Archived from the original on 2009-08-13. Retrieved 2007-10-29.
- Bridging Physical Access Systems and IT Networks Archived 2016-03-03 at the Wayback Machine, David Ting, TechNewsWorld, November 10, 2006.