Online Book Reader

Home Category

CEH_ Official Certified Ethical Hacker Review Guide_ Exam 312-50 - Kimberly Graves [78]

By Root 424 0

1. C. WEP uses the same key for encryption and authentication.

2. B. WEP is an acronym for Wired Equivalent Privacy.

3. C. WEP is crackable because of the lack of sophistication in using the IV when deploying RC4.

4. B. WPA uses TKIP.

5. C. WPA2 uses either a passphrase in personal mode or 802.1x/EAP/RADIUS in enterprise mode.

6. A. 802.11i is almost the same as WPA2.

7. D. A VPN is a layer 3 security solution for WLANs.

8. A. A DoS can be performed by a device sending constant deauth frames.

9. B. A rogue AP is the most dangerous attack against a WLAN because it gives a hacker an open door into the network.

10. B. 802.11i is a layer 2 technology.

LMMALS) 111r;

CEH EXAM OBJECTIVES COVERED IN THIS CHAPTER:

✓ Physical Security Breach Incidents

✓ Understanding Physical Security

✓ What Is the Need for Physical Security?

✓ Who Is Accountable for Physical Security?

✓ Factors Affecting Physical Security

Physical security is arguably the most critical area of IT security for preventing the loss or theft of confidential and sensitive data. If an organization fails to enforce adequate physical security, then all other technical security measures such as firewalls and intrusion detection systems (IDSs) can be bypassed.

There is a saying: "Once you're inside, you own the network." By physically securing your network and your organization, you prevent somebody from stealing equipment such as laptops or tape drives, placing hardware keyloggers on systems, and planting rogue access points on the network. Physical security relies heavily on individuals to enforce it and therefore is susceptible to social-engineering attacks, such as following an employee into the building without supplying the proper key or credentials (thus bypassing the physical security challenge).

This chapter will discuss the need for physical security and who is responsible for planning and enforcing it.

Physical Security Breach Incidents

It seems as though every day, a news article describes another prominent government agency or major corporation that has compromised client information or confidential employee information. For example, a laptop may be stolen in a home-invasion robbery or from a hotel room while an employee is traveling. This confidential or sensitive information can be dangerous in the hands of a hacker.

Equipment theft is one of the most common physical security attacks. Most people don't expect their computer to be stolen and are naive about locking down host systems; instead, they rely on standard network security mechanisms.

Many insider attacks are the result of physical security breaches. Once a hacker has gained physical access to the server, a single client system, or a network port, the results can be disastrous. In addition, such breaches are difficult to identify, track or locate. Some of the common security breaches caused by insufficient physical security are as follows:

■ Installation of malware such as keyloggers, viruses, Trojans, backdoors, or rootkits

■ Identification and capture of validation or authentication credentials such as passwords or certificates

■ Physical connection to the wired network to sniff confidential data such as passwords and credit card numbers

■ Access to systems to collect data that can be used to crack passwords stored locally on the system

■ Opportunity to plant rogue access points to create an open wireless network with access to the wired network

■ Theft of paper or electronic documents

■ Theft of sensitive fax information

■ Dumpster diving attack (emphasizing the need to shred important documents)

Understanding Physical Security

Generally security measures can be categorized in the following three ways:

Physical Physical measures to prevent access to systems include security guards, lighting, fences, locks, and alarms. Facility access points should be limited, and they should be monitored/protected by closed-circuit television (CCTV) cameras and alarms. The entrance to the facility should be restricted to authorized people. Access to laptop systems

Return Main Page Previous Page Next Page

®Online Book Reader