1/3
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Physical Attacks
Unlike attacks that exploit software vulnerabilities or rely on the operating system, this exploit the fact that if an attacker has physical access to a device.
For example, with physical access to a server or computer, an attacker can bypass the operating system
Door locks or physical barriers might prevent access from "honest" individuals, but there's always a way in for someone with the right tools or knowledge.
Physical security is just as important as digital security.
Brute Force Physical
Commonly associated with password discovery in the digital realm, it can also be a powerful tool in physical attacks.
If there’s a locked door or locked window, an attacker can use force entry and gain access to secured areas.
Regularly check your physical security, such as testing locks on doors and windows
Attackers may also try every possible method to bypass physical security measures; not uncommon for an attacker to attempt to break into a locked door or window to access valuable resources or information.
RFID Cloning
Widely used in access control systems, such as access badges and key fobs. If an attacker were able to clone or duplicate this, they would gain access to the same restricted areas as the original cardholder.
Duplicators are readily available for less than $50, and the duplication process can take just a few seconds.
By brushing up against someone with an access card they effectively create a duplicate.
Multi-Factor Authentication (MFA) is crucial
Even if an attacker manages to duplicate an RFID card, they would still need the personal identification number (PIN) or biometric data of the legitimate user to gain access to protected areas.
Environmental Attacks
An attacker can target the environment surrounding those systems to cause disruption.
Could turn off the power to a data center
Heating, Ventilation, and Air Conditioning (HVAC) systems are crucial for maintaining proper temperatures in large data centers.
If the attacker can manipulate the HVAC system, they could cause overheating or humidity levels that would force the data center to shut down.
Environmental attacks can also target fire suppression systems, potentially causing a denial of service by activating the system unnecessarily,