Physical Attacks Flashcards
Physical Attacks
Direct attacks on computational devices
Name some Environmental Factors
Electricity, Temperature, and Limited Conductance
Electricity (as an environmental factor)
Computing equipment requires stead uninterrupted power supply
Temperature (as an Environmental Factor)
Computer chips have a natural operating temperature and exceeding that temperature significantly can have sever consequences.
Limited Conductance (as an Environmental Factor)
Computing equipment relies on there being limited conductance in its environment. If random parts of a computer are connected electronically, then that equipment could be damaged.
Eavesdropping
The process of secretly listening in on another person’s conversation
Protection of sensitive information must go beyond computer security and extend to the ______________ in which this information is entered and read.
Environment
What are 3 simple eavesdropping techniques?
- Using social engineering to allow the attacker to read information over the victim’s shoulder (over shoulder)
- Installing small cameras to capture the information as it is being read (via camera)
- Using binoculars to view a victim’s monitor through an open window (look through open window)
What is the commingle referred to name of the direct observation techniques that were named?
Shoulder Surfing
Wiretapping
A form of eavesdropping involving physical connection to the communications channels to breach the confidentiality of communications;
to tap a telephone or telegraph wire or cellular signal in order to get information.
Inexpensive coaxial copper cables where information is transmitted via electrical impulses that travel through the cables.
Danger/Risk of Wiretapping
Because it’s relatively inexpensive, impulse can be measured and can reconstruct the data being transferred through a tapped cable - allowing an attacker to eavesdrop on network traffic.
True/False: Wiretapping Attacks are passive?
True
Why are wiretapping attacks considered passive attacks?
Because there is no alteration of the signal being transferred which makes them extremely difficult to detect; it’s snooping;
Passive Attack
When attacker cannot interact with any of the parties involved, attempting to break the system socket based upon observed data.
Name two type is Signal Emanations
- Radio Frequencies
2. Visible Light
Computer screens emit _______________________ that can be used to ________ what is ____________________.
Radio frequencies
Detect
being displayed
What type of reflections can be used to reconstruct a display from its reflection on a wall, coffee mug, or eyeglasses.
Visible Light
Both ____________________ and _____________________ require the attacker to have a receiver close enough to detect the signal.
Radio signal and Visible light
Acoustic Emissions
An attacker using an audio recording of a user tying on a keyboard to reconstruct what was typed.
Differential Power Analysis (DPA attack)
A side channel attack on smart cards with secure crypto precede or. Each crypto operation requires different power consumption.
a powerful tool attackers used to extract secret keys and compromise the security of tamper resistant devices
(extremely effective, low cost, and widely known)
Side Channel Attack
any attack based on information gained from the implementation of a computer system, rather than weaknesses in the implemented algorithm itself. i.e. DPA
Hardware Keyloggers
Small connectors that are installed between a keyboard and a computer
Keylogger
Any means of recording a victim’s keystrokes, typically used to eavesdrop passwords or other sensitive information
USB Keylogger
A device containing male and female USB connectors, which allow it to be placed between a USB port on a computer and a USB cable coming from a keyboard.
Emanation Blockage
Limiting the release of information from escaping into its general environment
Different type of Emanation Blockage
+Visible Light Emanations
+Acoustic Emanations
+Electromagnetic Emanations
How to block Visible light emanations?
By enclosing sensitive equipment in a windowless room, we block it.
How to block Acoustic Emanations?
By enclosing sensitive equipment in a room lined with sound-dampening materials, we block this.
How to block electromagnetic emanations?
By making sure every electrical cord and cable is well grounded and insulated, we block this.
Faraday Cages
An enclosure used to block electro magnetic fields/emanations in the air.
Surround sensitive equipment with metallic conductive shielding or mesh material where holes in the mesh are smaller than the wavelengths of the electromagnetic radiation we wish to block.
Computer Forensics
The practice of obtaining information contained on an electronic medium, such as computer systems, hard drives, and optical disks, usually for gathering evidence to be used in legal proceedings.
(True/False)
Many of the advanced techniques used by forensic investigators for legal proceedings can also be employed by attackers to uncover sensitive information.
True
What all does a Forensic Analysis involve?
It involves the physical inspection of the components of a computer, sometimes at the microscopic level, but it can also involve electronic inspection of a computer’s parts as well.
When a ___1___ is deleted, many ___2__ remove the ______3*_____.
- file
- OS
- file’s metadata
Metadata
Information about file size, location, and other properties; data about data;
Space within the __1__ containing __2____ is __3__ allowing future ___4*_______ to ____5____ it.
- disk
- metadata
- freed
- file operation
- overwrite
T/F?
Can forensic tools uncover “deleted” data if no overwriting has occurred?
True
Cold Boot Attack
A type of side channel attack where begins a process for obtaining unauthorized access to a computer’s encryption keys when the computer is left physically unattended.
+ memory dump of RAM
+ used for retrieving encryption keys from a running OS for malicious reasons
+ relies on DRAM & SRAM
DRAM
Dynamic Random-Access Memory aka Dynamic RAM : type of RAM or computer memory and the most commonly used as main memory; used for the data or program code needed b a computer processor to function.
T/F? DRAM is voalitle?
True
What does cooling the DRAM in low temperature cause?
A significant slow in decay. This makes the content of the memory able to be reconstructed.
How have researchers demonstrated how to reconstruct memory image?
By having powering off preceded by freezing the RAM and then booting from a live CD
ATM
Automatic Teller Machine that allows customers of financial institutions to complete withdrawal and deposit transactions without human assistance.
The ATM has an _______1*__________ processor that creates a __2__ of a card number using the entered __3__ and __4__ it to the ___5__ hash on the card or in a ___6__ database.
- internal cryptographic
- hash
- PIN
- compares
- stored
- remote
3 Types of Attacks on ATMs?
Fake ATM, Lebanese Loop, and Skimmer
Fake ATM
captures both credit/debit cards and PINs at the same time.
Lebanese Loop
Sleeve inserted into the card slot of the ATM, unknowingly. Customer inserts card, thinks machine malfunctions and leaves. The sleeve is then removed with the victim’s card.
Skimmer
A device that reads and stores magnetic stripe information when a card is swiped. Skimmer is installed, unknowingly, over card slot of ATM & store’s credit card info. Info can be retrieved later and used to make duplicates of original cards.