Tobias on Locks and Insecurity Engineering (eBook)

Understanding and Preventing Design Vulnerabilities in Locks, Safes, and Security Hardware
eBook Download: EPUB
2024 | 1. Auflage
720 Seiten
John Wiley & Sons (Verlag)
978-1-119-82826-6 (ISBN)

Lese- und Medienproben

Systemvoraussetzungen
61,99 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen
A must-read exploration of lock and physical security from a renowned author and expert

In Tobias on Locks and Insecurity Engineering, renowned investigative attorney and physical security expert Marc Weber Tobias delivers a comprehensive and insightful exploration of how locks are designed, built, and -- ultimately -- defeated by criminals, spies, hackers, and even lockpickers. In the book, you'll discover the myriad ways that security experts and bad actors have compromised physical locks using everything from the newest 3D printers to 99-cent ballpoint pens.

The book explores the origins of different lock designs and the mistakes that design engineers make when they create new locks. It explains the countless ways that locks remain at risk for attack.

The author explains the latest lock designs and technology, as well as how to assess whether a specific solution will work for you depending on your individual security requirements and use case. You'll also find:

* Ways to differentiate between fatally flawed locks and solid, secure options

* Several relevant and real-world case examples of catastrophic lock design failures that led to monetary loss, property damage, or bodily harm

* Examinations of lock security from the perspectives of forced entry, covert entry, and key-control

An instructive and indispensable roadmap to locks and physical security, Tobias on Locks and Insecurity Engineering is the perfect guide for security and information technology professionals, design engineers, risk managers, law enforcement personnel, intelligence agents, regulators, policymakers, investigators, lawyers, and more.

Marc Tobias is an investigative attorney and physical security/communications expert. For the past forty years, he has worked investigations, both criminal and civil, first for government agencies and then private corporate clients. He also works for many of the major lock manufacturers in the world and runs a team that figures out how to compromise these locks in seconds, then fix them. His story was pretty much summed up by Wired Magazine who dubbed him the "Keymaster."

Foreword xxxiii

Introduction xxxv

Part I Locks, Safes, and Insecurity Engineering 1

Chapter 1 Insecurity Engineering and the Design of Locks 3

Chapter 2 Insecurity Engineering: A Lack of Expertise and Imagination 25

Chapter 3 Vulnerability Assessment in Lock Designs 49

Chapter 4 The 3T2R Rule for Assessing the Security of a Lock 67

Part II Legal and Regulatory Issues in Locks, Safes, and Security Systems 87

Chapter 5 Security Is All About Liability 89

Chapter 6 Legal Liability and Insecurity Engineering 103

Chapter 7 Standards for Locks and Safes 131

Chapter 8 Patents, Security, and the Protection of Intellectual Property 163

Chapter 9 Notification of Defects in Product Design 187

Chapter 10 Legal and Security Issues in Keying Systems 209

Part III Basic Designs and Technologies for Mechanical and Electronic Locks 231

Chapter 11 A Brief History of Lock Design and Development 233

Chapter 12 Industry Definitions 257

Chapter 13 Modern Locking Mechanisms: A Merging of Old and New Technology 279

Chapter 14 A Comparison of High-Security Lock Designs 317

Part IV Design and Insecure Engineering of Locks 339

Chapter 15 Attacks Against Locks: Then and Now 341

Chapter 16 An Overview: Vulnerability Analysis in Designs and Testing 379

Chapter 17 Destructive Attacks Against Locks and Related Hardware 395

Chapter 18 Covert Methods of Entry 417

Chapter 19 Attacks Against Electronic Locks 445

Chapter 20 Advanced Attacks Against High-Security Locks 459

Part V Attacks on Key Control and Special Keying Systems 475

Chapter 21 Attacking Keys and Keying Systems 477

Chapter 22 Advanced Attacks on Key Control: 3D Printers and Special Software 507

Chapter 23 Digital Fingerprints of Locks: Electronic Decoding Systems 523

Chapter 24 Code-Setting Keys: A Case Study of an Attack on High-Security Key Control 537

Part VI Specific Case Examples 545

Chapter 25 Case Examples from Part VII Rules 547

Chapter 26 Case Examples By Category 571

Part VII Design Rules, Axioms, and Principles 597

Chapter 27 Design Rules, Axioms, and Guidelines 599

Epilogue 625

Appendix A Patents Issued 627

Appendix B Trademark Listing 629

Index 633

Erscheint lt. Verlag 22.1.2024
Sprache englisch
Themenwelt Mathematik / Informatik Informatik Theorie / Studium
Schlagworte Computer Science • Computer Security & Cryptography • Computersicherheit • Computersicherheit u. Kryptographie • Informatik
ISBN-10 1-119-82826-0 / 1119828260
ISBN-13 978-1-119-82826-6 / 9781119828266
Haben Sie eine Frage zum Produkt?
EPUBEPUB (Adobe DRM)

Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM

Dateiformat: EPUB (Electronic Publication)
EPUB ist ein offener Standard für eBooks und eignet sich besonders zur Darstellung von Belle­tristik und Sach­büchern. Der Fließ­text wird dynamisch an die Display- und Schrift­größe ange­passt. Auch für mobile Lese­geräte ist EPUB daher gut geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine Adobe-ID und die Software Adobe Digital Editions (kostenlos). Von der Benutzung der OverDrive Media Console raten wir Ihnen ab. Erfahrungsgemäß treten hier gehäuft Probleme mit dem Adobe DRM auf.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine Adobe-ID sowie eine kostenlose App.
Geräteliste und zusätzliche Hinweise

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Discover tactics to decrease churn and expand revenue

von Jeff Mar; Peter Armaly

eBook Download (2024)
Packt Publishing (Verlag)
25,19