2.4 Physical Attacks

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/3

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

4 Terms

1
New cards

Physical Attacks

Unlike attacks that exploit software vulnerabilities or rely on the operating system, this exploit the fact that if an attacker has physical access to a device.

  • For example, with physical access to a server or computer, an attacker can bypass the operating system

  • Door locks or physical barriers might prevent access from "honest" individuals, but there's always a way in for someone with the right tools or knowledge.

  • Physical security is just as important as digital security.

2
New cards

Brute Force Physical

Commonly associated with password discovery in the digital realm, it can also be a powerful tool in physical attacks.

  • If there’s a locked door or locked window, an attacker can use force entry and gain access to secured areas.

  • Regularly check your physical security, such as testing locks on doors and windows

  • Attackers may also try every possible method to bypass physical security measures; not uncommon for an attacker to attempt to break into a locked door or window to access valuable resources or information.

3
New cards

RFID Cloning

Widely used in access control systems, such as access badges and key fobs. If an attacker were able to clone or duplicate this, they would gain access to the same restricted areas as the original cardholder.

  • Duplicators are readily available for less than $50, and the duplication process can take just a few seconds.

  • By brushing up against someone with an access card they effectively create a duplicate.

  • Multi-Factor Authentication (MFA) is crucial

  • Even if an attacker manages to duplicate an RFID card, they would still need the personal identification number (PIN) or biometric data of the legitimate user to gain access to protected areas.

4
New cards

Environmental Attacks

An attacker can target the environment surrounding those systems to cause disruption.

  • Could turn off the power to a data center

  • Heating, Ventilation, and Air Conditioning (HVAC) systems are crucial for maintaining proper temperatures in large data centers.

  • If the attacker can manipulate the HVAC system, they could cause overheating or humidity levels that would force the data center to shut down.

  • Environmental attacks can also target fire suppression systems, potentially causing a denial of service by activating the system unnecessarily,