Electronics Protection - Spring 2015 - (Page 16)
Feature
Bridging the Technology Gap: The Importance of
Cyber and Physical Security within the Data Center
Aldon Blackwood, Product Manager
E-LINE by DIRAK
In recent months, cyber-attacks have been on the rise, showing no signs of slowing down. Their attacks have spanned continents and industries, targeting companies of all shapes, sizes
and levels of prominence. Highlighting the risk that all businesses
who maintain customer data are currently facing. The breaches at
Target, Home Depot and Sony did not just result in significant data
loss, but also created irreparable damage to their brands, shaking
customers' confidence in the ability of these businesses to secure
their most sensitive information.
In the Target attack alone, 40
million customers had their credit
and debit card numbers stolen
resulting in a 46 percent drop in
profits for the company in their
subsequent quarter compared
with the previous year. Additionally, the credit card companies
and banks of the Target customers
spent $200 million reissuing stolen
cards, while Target spent $100
million upgrading their payment
system to support Chip-and-Pin
enabled cards. To avoid future
breaches and companies are focusing even more of their resources
on protecting their assets by ensuring they have a comprehensive
cybersecurity posture.
While there is no doubt that cybersecurity is an essential aspect
to any organization's security, the tunnel vision created by recent
events can have a dangerous side effect, ignoring physical security.
The two sides of the security spectrum cannot be viewed as mutually exclusive, but rather a partnership where both are working in
tandem to protect the critical assets of organizations. While cybersecurity and credit card technology has advanced and adapted
to the modern threat, the physical security realm still lags far
behind. The Wiegand Protocol, developed in the 80's, is still the
standard communication language used to transmit and process
data between the access card, keypad or biometric reader and
the backend controller. The communication between devices on
this technology is unencrypted and can be easily tampered with
and falsified. These systems have no way of knowing if a reader
has been disconnected or goes offline and will not send any alerts
to the system administrator letting them know it has been corrupted or stolen. An intruder could hack into the system and trick
it into granting access to unauthorized users and lock out those
with authorization, while simultaneously collecting authorization
data for any individual that had access to the building. Using this
authorization data, the intruder could now gain access to other
secured areas.
Once inside the data center, the server racks that house critical
data are still being secured with a mechanical handle that normally utilizes standard keys. Even when using unique locks, keys can
be lost, stolen or duplicated. This exposes companies to the most
common data breach threat: an insider job. By utilizing untraceable mechanical keys, companies remove all possibility
16
Spring 2015 * www.ElectronicsProtectionMagazine.com
for auditability. This makes it easier for employees, contractors or
visitors to gain access to the data center floor and racks. Given
these vulnerabilities, it is critical for physical security to play catch
up, before criminals will begin to adapt and target the primitive
physical IT security measures.
A more modern solution to outdated physical security has been
biometrics, but the widespread adoption for its ability to protect
data centers is misguided. Biometrics by itself is an insufficient
solution to protecting critical assets; each individual has a limited
number of authentication credentials, e.g. 10 fingerprints, which
cannot change. While they may
possess unique properties, they
are always in public visibility and
exposed to potential risks. For example, the Chaos Computer Club
(CCC), Europe's largest hacker association, exhibited their ability to
reconstruct an exact fingerprint of
Ursula von der Leyen, the German
Defense Minister. CCC was able to
do this using a consumer grade
camera and Verifinger, a software
available to the general public. This
demonstration proves that there
are still large vulnerabilities in
biometric technology. Additionally,
it is standard practice for finger
print data to be collected during border crossings, criminal and
civil cases and for government employees; creating databases of
potential users and their authentication credentials.
If biometrics are not adequate, what technical requirements for
building and rack level access control should be implemented?
Mechatronic locks should transmit only encrypted communication
to the controller, while implementing dual factor authentication at
the reader. This type of solution at the IT cabinet's door will prevent unauthorized persons, while software should provide a complete audit trail with the specific identity of each individual who
successfully gained access, showing the time they entered, and
how long they stayed inside. A product that is already bringing this
level of security to the industry is E-LINE by DIRAK's MLR series.
The MLR series of locks are IP addressed server rack handles
capable of one to four factors of authentication. The handles provide a tamper-proof solution that increases security and mitigates
risk by delivering real time monitoring, auditability and AES-256
encrypted communication. By operating and still requiring authentication in both network and power down situations, they eliminate the need for mechanical keys and create a gapless audit trail.
This type of solution will give the system administrator the ability
to monitor, control and report all activity occurring at each rack
any time of the day, while keeping all unauthorized personnel out.
Organizations need to proactively address risks and examine
vulnerabilities on all fronts. This requires an integrated security
plan that successfully bridges the gap between cyber and physical
data security.
For more information visit www.elinebydirak.com.
http://www.elinebydirak.com
http://www.ElectronicsProtectionMagazine.com
Table of Contents for the Digital Edition of Electronics Protection - Spring 2015
Editor's Choice
Predictive Modeling: The Next Frontier in Data Center Condition Maintenance
Don't Forget the Batteries
Military Aircraft Power
Pumped Two Phase Cooling Solutions for Challenging Thermal Management Applications
Identifying the Ideal Mechanical PCB Hardware for Electronic Systems
Bridging the Technology Gap: The Importance of Cyber and Physical Security within the Data Center
Waterproof Mobile Device Protection without Compromising Acoustic Quality
Enclosures
Thermal
EMI/EMC/RFI
Power
Hardware
Contamination
Industry News
Electronics Protection - Spring 2015
https://www.nxtbook.com/nxtbooks/webcom/ep_2017summer
https://www.nxtbook.com/nxtbooks/webcom/ep_2017spring
https://www.nxtbook.com/nxtbooks/webcom/ep_2017winter
https://www.nxtbook.com/nxtbooks/webcom/ep_2016fall
https://www.nxtbook.com/nxtbooks/webcom/ep_2016summer
https://www.nxtbook.com/nxtbooks/webcom/ep_2016spring
https://www.nxtbook.com/nxtbooks/webcom/ep_2015winter
https://www.nxtbook.com/nxtbooks/webcom/ep_2015fall
https://www.nxtbook.com/nxtbooks/webcom/ep_2015summer
https://www.nxtbook.com/nxtbooks/webcom/ep_2015spring
https://www.nxtbook.com/nxtbooks/webcom/ep_2014winter
https://www.nxtbook.com/nxtbooks/webcom/ep_2014fall
https://www.nxtbook.com/nxtbooks/webcom/ep_2014summer
https://www.nxtbook.com/nxtbooks/webcom/ep_2014spring
https://www.nxtbook.com/nxtbooks/webcom/ep_20140102
https://www.nxtbook.com/nxtbooks/webcom/ep_20131112
https://www.nxtbook.com/nxtbooks/webcom/ep_20130910
https://www.nxtbook.com/nxtbooks/webcom/ep_20130708
https://www.nxtbook.com/nxtbooks/webcom/ep_20130506
https://www.nxtbook.com/nxtbooks/webcom/ep_20130304
https://www.nxtbook.com/nxtbooks/webcom/ep_20130102
https://www.nxtbook.com/nxtbooks/webcom/ep_20121112
https://www.nxtbook.com/nxtbooks/webcom/ep_20120910
https://www.nxtbook.com/nxtbooks/webcom/ep_20120607
https://www.nxtbook.com/nxtbooks/webcom/ep_20120304
https://www.nxtbook.com/nxtbooks/webcom/ep_20120102
https://www.nxtbook.com/nxtbooks/webcom/ep_20111112
https://www.nxtbook.com/nxtbooks/webcom/ep_20110910
https://www.nxtbook.com/nxtbooks/webcom/ep_20110607
https://www.nxtbookmedia.com