Details

Tobias on Locks and Insecurity Engineering


Tobias on Locks and Insecurity Engineering

Understanding and Preventing Design Vulnerabilities in Locks, Safes, and Security Hardware
1. Aufl.

von: Marc Weber Tobias

61,99 €

Verlag: Wiley
Format: PDF
Veröffentl.: 17.01.2024
ISBN/EAN: 9781119828631
Sprache: englisch
Anzahl Seiten: 720

DRM-geschütztes eBook, Sie benötigen z.B. Adobe Digital Editions und eine Adobe ID zum Lesen.

Beschreibungen

<p><b>A must-read exploration of lock and physical security from a renowned author and expert</b> <p>In <i>Tobias on Locks and Insecurity Engineering,</i> renowned investigative attorney and physical security expert Marc Weber Tobias delivers a comprehensive and insightful exploration of how locks are designed, built, and — ultimately — defeated by criminals, spies, hackers, and even lockpickers. In the book, you'll discover the myriad ways that security experts and bad actors have compromised physical locks using everything from the newest 3D printers to 99-cent ballpoint pens. <p>The book explores the origins of different lock designs and the mistakes that design engineers make when they create new locks. It explains the countless ways that locks remain at risk for attack. <p>The author explains the latest lock designs and technology, as well as how to assess whether a specific solution will work for you depending on your individual security requirements and use case. You'll also find: <ul> <li>Ways to differentiate between fatally flawed locks and solid, secure options</li> <li>Several relevant and real-world case examples of catastrophic lock design failures that led to monetary loss, property damage, or bodily harm</li> <li>Examinations of lock security from the perspectives of forced entry, covert entry, and key-control</li> </ul> <p>An instructive and indispensable roadmap to locks and physical security, <i>Tobias on Locks and Insecurity Engineering</i> is the perfect guide for security and information technology professionals, design engineers, risk managers, law enforcement personnel, intelligence agents, regulators, policymakers, investigators, lawyers, and more.
<p>Foreword xxxiii</p> <p>Introduction xxxv</p> <p><b>Part I Locks, Safes, and Insecurity Engineering 1</b></p> <p>Chapter 1 Insecurity Engineering and the Design of Locks 3</p> <p>Chapter 2 Insecurity Engineering: A Lack of Expertise and Imagination 25</p> <p>Chapter 3 Vulnerability Assessment in Lock Designs 49</p> <p>Chapter 4 The 3T2R Rule for Assessing the Security of a Lock 67</p> <p><b>Part II Legal and Regulatory Issues in Locks, Safes, and Security Systems 87</b></p> <p>Chapter 5 Security Is All About Liability 89</p> <p>Chapter 6 Legal Liability and Insecurity Engineering 103</p> <p>Chapter 7 Standards for Locks and Safes 131</p> <p>Chapter 8 Patents, Security, and the Protection of Intellectual Property 163</p> <p>Chapter 9 Notification of Defects in Product Design 187</p> <p>Chapter 10 Legal and Security Issues in Keying Systems 209</p> <p><b>Part III Basic Designs and Technologies for Mechanical and Electronic Locks 231</b></p> <p>Chapter 11 A Brief History of Lock Design and Development 233</p> <p>Chapter 12 Industry Definitions 257</p> <p>Chapter 13 Modern Locking Mechanisms: A Merging of Old and New Technology 279</p> <p>Chapter 14 A Comparison of High-Security Lock Designs 317</p> <p><b>Part IV Design and Insecure Engineering of Locks 339</b></p> <p>Chapter 15 Attacks Against Locks: Then and Now 341</p> <p>Chapter 16 An Overview: Vulnerability Analysis in Designs and Testing 379</p> <p>Chapter 17 Destructive Attacks Against Locks and Related Hardware 395</p> <p>Chapter 18 Covert Methods of Entry 417</p> <p>Chapter 19 Attacks Against Electronic Locks 445</p> <p>Chapter 20 Advanced Attacks Against High-Security Locks 459</p> <p><b>Part V Attacks on Key Control and Special Keying Systems 475</b></p> <p>Chapter 21 Attacking Keys and Keying Systems 477</p> <p>Chapter 22 Advanced Attacks on Key Control: 3D Printers and Special Software 507</p> <p>Chapter 23 Digital Fingerprints of Locks: Electronic Decoding Systems 523</p> <p>Chapter 24 Code-Setting Keys: A Case Study of an Attack on High-Security Key Control 537</p> <p><b>Part VI Specific Case Examples 545</b></p> <p>Chapter 25 Case Examples from Part VII Rules 547</p> <p>Chapter 26 Case Examples By Category 571</p> <p><b>Part VII Design Rules, Axioms, and Principles 597</b></p> <p>Chapter 27 Design Rules, Axioms, and Guidelines 599</p> <p>Epilogue 625</p> <p>Appendix A Patents Issued 627</p> <p>Appendix B Trademark Listing 629</p> <p>Index 633</p>
<p><b>Marc Tobias</b> is an investigative attorney and physical security/communications expert. For the past forty years, he has worked investigations, both criminal and civil, first for government agencies and then private corporate clients. He also works for many of the major lock manufacturers in the world and runs a team that figures out how to compromise these locks in seconds, then fix them. His story was pretty much summed up by <i>Wired Magazine</i> who dubbed him the "Keymaster."</p>

Diese Produkte könnten Sie auch interessieren:

Data Mining and Machine Learning Applications
Data Mining and Machine Learning Applications
von: Rohit Raja, Kapil Kumar Nagwanshi, Sandeep Kumar, K. Ramya Laxmi
EPUB ebook
190,99 €
Data Mining and Machine Learning Applications
Data Mining and Machine Learning Applications
von: Rohit Raja, Kapil Kumar Nagwanshi, Sandeep Kumar, K. Ramya Laxmi
PDF ebook
190,99 €