Click here to monitor SSC
SQLServerCentral is supported by Red Gate Software Ltd.
 
Log in  ::  Register  ::  Not logged in
 
 
 
        
Home       Members    Calendar    Who's On


Add to briefcase

Physical Security Expand / Collapse
Author
Message
Posted Saturday, August 24, 2013 11:53 AM


SSC-Dedicated

SSC-DedicatedSSC-DedicatedSSC-DedicatedSSC-DedicatedSSC-DedicatedSSC-DedicatedSSC-DedicatedSSC-DedicatedSSC-DedicatedSSC-DedicatedSSC-DedicatedSSC-DedicatedSSC-Dedicated

Group: Administrators
Last Login: Yesterday @ 3:11 PM
Points: 31,368, Visits: 15,837
Comments posted to this topic are about the item Physical Security






Follow me on Twitter: @way0utwest

Forum Etiquette: How to post data/code on a forum to get the best help
Post #1488137
Posted Saturday, August 24, 2013 6:15 PM


SSC-Dedicated

SSC-DedicatedSSC-DedicatedSSC-DedicatedSSC-DedicatedSSC-DedicatedSSC-DedicatedSSC-DedicatedSSC-DedicatedSSC-DedicatedSSC-DedicatedSSC-DedicatedSSC-DedicatedSSC-Dedicated

Group: General Forum Members
Last Login: 2 days ago @ 7:27 AM
Points: 35,769, Visits: 32,437
One of the other possible security problems is with the janitorial and repair staff. They have the keys and RFIDs to get just about anywhere. They might not be able to get into the server room but they sure can visit your desk. They don't even need to stop what they're doing if they have a good enough memory. 24/7 video monitoring won't be enough for them to pickup what they need for a hack or whatever. Even if they need to linger, who's to say that they haven't enlisted the person watching the tubes? Locked desk drawers don't make it either. It takes someone with the right tool about the same amount of time to open a locked desk as it does as someone with the correct key.

Of course, wireless transmitters can be easily hidden just about anywhere. Normally people don't need to go that far though. The supposedly secure wireless transmitters in the building do just fine.


--Jeff Moden
"RBAR is pronounced "ree-bar" and is a "Modenism" for "Row-By-Agonizing-Row".

First step towards the paradigm shift of writing Set Based code:
Stop thinking about what you want to do to a row... think, instead, of what you want to do to a column."

(play on words) "Just because you CAN do something in T-SQL, doesn't mean you SHOULDN'T." --22 Aug 2013

Helpful Links:
How to post code problems
How to post performance problems
Post #1488179
Posted Sunday, August 25, 2013 11:45 AM


SSCertifiable

SSCertifiableSSCertifiableSSCertifiableSSCertifiableSSCertifiableSSCertifiableSSCertifiableSSCertifiableSSCertifiable

Group: General Forum Members
Last Login: Yesterday @ 4:21 PM
Points: 7,928, Visits: 9,653
Yes, we should try to get our offices, server rooms, and so on up to a high standard of physical security.

But something far more important for us to do is always to behave as if the physical security of all those things is totally broken.

The physical security measures that most companies can afford are so easily hackable and/or bypassable that if an attack by a competent and well resourced attacker takes place it will almost certainly succeed. Confidential information lying around on desk and table tops, PCs left logged in and unlocked overnight are bad; confidential information in ordinary desk drawers or cupboards isn't a lot better; nor is unshredded confidential information in waste bins. Confidential information held on portable storage without really effective encryption is worse. Relying on physical security to prevent any such confidential information from getting to those whom you don't want to have it is extremely foolish, unless you know that the risk of attack is extremely low because the "enemy" doesn't care enough about the information to spend two cents on obtaining it. Many people have been badly bitten by thinking they knew that.


Tom
Post #1488220
Posted Monday, August 26, 2013 5:32 AM
SSC-Enthusiastic

SSC-EnthusiasticSSC-EnthusiasticSSC-EnthusiasticSSC-EnthusiasticSSC-EnthusiasticSSC-EnthusiasticSSC-EnthusiasticSSC-Enthusiastic

Group: General Forum Members
Last Login: 2 days ago @ 5:55 AM
Points: 155, Visits: 285
In a bookstore one day I picked up a book called "No-Tech Hacking". I sat there and read nearly the whole thing. Certainly an eye-opener regarding physical security.

____________
Just my $0.02 from over here in the cheap seats of the peanut gallery - please adjust for inflation and/or your local currency.
Post #1488344
Posted Monday, August 26, 2013 6:32 AM
Right there with Babe

Right there with BabeRight there with BabeRight there with BabeRight there with BabeRight there with BabeRight there with BabeRight there with BabeRight there with Babe

Group: General Forum Members
Last Login: Tuesday, December 16, 2014 12:11 PM
Points: 771, Visits: 1,971
lshanahan (8/26/2013)
In a bookstore one day I picked up a book called "No-Tech Hacking". I sat there and read nearly the whole thing. Certainly an eye-opener regarding physical security.



hmmm is reading the whole book in the store a version of 'no tech hacking'? ;)


...

-- FORTRAN manual for Xerox Computers --
Post #1488353
Posted Monday, August 26, 2013 7:34 AM
SSC-Addicted

SSC-AddictedSSC-AddictedSSC-AddictedSSC-AddictedSSC-AddictedSSC-AddictedSSC-AddictedSSC-Addicted

Group: General Forum Members
Last Login: Monday, December 15, 2014 7:14 AM
Points: 494, Visits: 819
For obvious reasons I am leaving all details out of this comment.

I know of a person that was easily able to go through every nursing station in a hospital and at each one, disconnect a device, plug in something and then reattach the device to his. He did this without a hospital ID, without a contractor badge, without a badge from anywhere. He wore ripped jeans, a ratty t-shirt, hadn't even combed his hair. He made himself look as suspicious as possible.

Not one person stopped him. Not one person even questioned him. He was working on computers, he "must be trustworthy!"

A short time later management received a report about the 'intrusion". I am sure that discussions were had, people were talked to, and that it was made clear exactly what to do if this type of event occurs.

Do I believe anything changed? Well, I prefer to not speculate...


Dave
Post #1488376
Posted Monday, August 26, 2013 1:03 PM
SSCrazy

SSCrazySSCrazySSCrazySSCrazySSCrazySSCrazySSCrazySSCrazy

Group: General Forum Members
Last Login: 2 days ago @ 12:50 PM
Points: 2,500, Visits: 1,586
L' Eomot Inversé (8/25/2013)


But something far more important for us to do is always to behave as if the physical security of all those things is totally broken.


Perfect - I had not heard something this important stated so simply before.


Not all gray hairs are Dinosaurs!
Post #1488479
Posted Tuesday, August 27, 2013 12:44 PM


SSChasing Mays

SSChasing MaysSSChasing MaysSSChasing MaysSSChasing MaysSSChasing MaysSSChasing MaysSSChasing MaysSSChasing Mays

Group: General Forum Members
Last Login: 2 days ago @ 12:00 PM
Points: 636, Visits: 801
I've heard of retailers who make it all too easy to walk up to one of their terminals and get to a root prompt.


Tony
------------------------------------
Are you suggesting coconuts migrate?
Post #1488908
Posted Tuesday, August 27, 2013 12:56 PM
SSCrazy

SSCrazySSCrazySSCrazySSCrazySSCrazySSCrazySSCrazySSCrazy

Group: General Forum Members
Last Login: 2 days ago @ 12:50 PM
Points: 2,500, Visits: 1,586
tabinsc (8/27/2013)
I've heard of retailers who make it all too easy to walk up to one of their terminals and get to a root prompt.


Now that is full-service retail at its best!


Not all gray hairs are Dinosaurs!
Post #1488913
« Prev Topic | Next Topic »

Add to briefcase

Permissions Expand / Collapse