Week 9: Physical and environmental security Flashcards
Give an example of a compromising emanation involving unintentional signals.
Unintentional signals that, if intercepted and analysed, would disclose the information transmitted, received, handled, or otherwise processed
What is Emission Security?
Preventing attacks using compromising emanations
What are side-channel attacks?
attacks that exploit stray optical, thermal and acoustic emanations from various kinds of equipment
What are the two types of side-channel attacks?
Passive and active attacks
What is a passive side-channel attack?
: The opponent makes use of electromagnetic signals. E.g.:
leakage through power and signal cables,
leakage through radio frequency (RF) signals
What is an active side-channel attack?
The compromising emanations are hostilely induced or provoked. E.g.:
Tempest viruses,
“Nonstop”
“Glitching” and Differential Fault Analysis (in smartcards)
What is Black Equipment
A term applied to equipment that processes only unclassified and/or encrypted information.
What is black line?
An optical fibre or a metallic wire that carries a black signal or that originates/terminates in a black equipment or system.
What is Red Equipment?
A term applied to equipment that processes unencrypted information (NSI) that requires protection during electrical/electronic processing
WHat is Red Line?
An optical fibre or a metallic wire that carries a red signal or that originates/terminates in a red equipment or system.
What is a red-side processor?
responsible for cryptographic functions
What is a black side processor?
responsible for communication stacks and drivers
There is an NSA specification and NATO certification for protecting equipment, why arent they revealed
Classified
In 1981, what did NATO agree on?
agreed on a scheme to have vendors offer approved TEMPEST products for sale to NATO countries
What does the NSA specification factors include?
distance, shielding, filtering and masking
What is inspectable space?
The space surrounding equipment that processes classified or sensitive information within which exploitation is not practical or legal authority to identify and/or remove a potential exploitation exists.
What is Uncontrolled Access Area?
The space in and around a building where no personnel access controls are exercised.
What is TEMPEST Certified Equipment or System?
Equipment or systems that have complied with the US requirements of NSTISSAM TEMPEST/1-92 Level I or previous editions.
What is a recommendation from tempest?
50cm between red processor and black
wires
equipment
power lines
What is a method of cable protection?
Optical fibre does not emit electromagnetic energy.
Eavesdropping would require physical access to the fibre (difficult to occur undetected)
Cables can be manufactured in an intruder-resistant interlock armor, using steel or aluminium spiral wraps with UV-resistant sheath.
Secure connectors can help mixed-use facilities to keep systems separate
In the case of copper, crosstalk can be further minimised with a foil shield.
What is Stingray?
Stingray is an example of an active attack, in which a fake base station tricks nearby phones to authenticate with them instead of a real base station (for which the signal would be weaker)