Security
10 steps to lower the chances of a physical security attack
Physical Security Breaches: Risks, Methods, and Prevention Strategies.
Security
Physical Security Breaches: Risks, Methods, and Prevention Strategies.
A physical security attack can cause at least as much, or even more, damage than a cyber attack. Investments in digital and physical security need to go hand in hand, otherwise vulnerabilities will be created. Moreover, as investments in cybersecurity increase, criminals will shift their efforts towards physical breaches, since most security technology solutions still date back to the 20th century. The most common risks are listed below.
Unauthorized access may lead to stolen confidential documents, desktops and hard drives. Although most assets can be replaced easily, the data stored on them might be lost forever. Or even worse, the data stored on the stolen assets can contain sensitive company information, which might lead to new cyberattacks.
A break-in usually results in damaged equipment. It will take time to replace the damaged assets or downtime associated with broken equipment.
Many companies still have server rooms. Unauthorized access can cause immense damage: remote access can be set up, information can be copied, remote monitoring can be implemented, bugs can be installed, etc. Besides these risks, detection of this type of breach will be very hard.
A lot of people still write passwords down in a notebook or on a post-it. This information can be easily retrieved and used for a cyberattack in a later stage. Next to this, unguarded and unlocked desktops also form a major threat to retrieve confidential information or passwords.
The consequences of a physical data breach, such as company downtime, data leaks and uncertainty, can lead to reputation damage and lost business.
Most physical security attacks are hard to detect, since they're very subtle. The most common methods are described below.
Social engineering is a manipulation technique to obtain sensitive information, such as passwords, access badges or company intel. Tailgating is an example of social engineering where an unauthorized individual directly follows an authorized individual as he or she passes through access control. Another example is the "coffee trick". This form of social engineering occurs when an unauthorized individual holds a coffee cup in one hand and documents in the other hand. Out of friendliness, most unsuspecting employees will hold the door for the unauthorized individual. Social engineering can go much further than the previous examples. Attackers can pretend to be contractors, journalists or company management from another branch to gain physical access.
Another way of breaking into a building is by hacking the access control system. For example: by eavesdropping an unauthorized RFID reader can listen to conversations between an RFID tag and an RFID reader to obtain access data. D. Maldonado, a Security Researcher, has demonstrated that RFID cards can be remotely copied in a matter of seconds at DEF CON 25.
Eavesdropping can also be used to overhear lock codes, pin codes, and security passwords. Unsecured network communications is one of the primary triggers for an eavesdropping attack.
A third, and less subtle, method is a physical break-in. Usually, these break-ins occur when there's no surveillance system, no security guard on site or when the response time is slow.