D1 - Marc Weber Tobias - The in Security of Mechanical Locks
D1 - Marc Weber Tobias - The in Security of Mechanical Locks
D1 - Marc Weber Tobias - The in Security of Mechanical Locks
SECONDS OR LESS:
Is it a real threat to security?
Bumping as a method of covert entry
©2007 Marc Weber Tobias
ATTACK ON LOCKS: TWO
THREATS TO SECURITY
♦ MECHANICAL LOCKS ARE SUBJECT
TO BYPASS
♦ ACCESS CONTROL SYSTEMS UTILIZE
MECHANICAL LOCKS
♦ THREE PRIMARY ISSUES FOR I-T:
– Bumping
– Master key extrapolation
– Ability to replicate keys
A THREAT TO THE I-T
ENVIRONMENT
♦ NON-SOPHISTICATED ATTACKS
♦ EASY TO ACCOMPLISH
♦ NO FORENSIC TRACES
♦ LOW RISK OF DETECTION
♦ 3T-2R RULE
♦ CAN COMPROMISE AN ENTIRE
FACILITY OR CRITICAL LOCKS
LOCKS PROVIDE SECURITY
♦ Protect doors, safes and barriers from being
opened
♦ They control movement of barriers to entry
♦ Relied upon as first level of security
♦ Most popular: pin tumbler designs
TYPES OF LOCKS
♦ WARDED
♦ LEVER
♦ WAFER AND DISK TUMBLER
♦ PIN TUMBLER
♦ HYBRID: COMBINED TECHNOLOGIES
♦ COMBINATION
PIN TUMBLER LOCK