Beschreibung
A must-read exploration of lock and physical security from a renowned author and expert
InTobias on Locks and Insecurity Engineering, renowned investigative attorney and physical security expert Marc Weber Tobias delivers a comprehensive and insightful exploration of how locks are designed, built, and ultimately defeated by criminals, spies, hackers, and even lockpickers. In the book, you'll discover the myriad ways that security experts and bad actors have compromised physical locks using everything from the newest 3D printers to 99-cent ballpoint pens.
The book explores the origins of different lock designs and the mistakes that design engineers make when they create new locks. It explains the countless ways that locks remain at risk for attack.
The author explains the latest lock designs and technology, as well as how to assess whether a specific solution will work for you depending on your individual security requirements and use case. You'll also find:Ways to differentiate between fatally flawed locks and solid, secure optionsSeveral relevant and real-world case examples of catastrophic lock design failures that led to monetary loss, property damage, or bodily harmExaminations of lock security from the perspectives of forced entry, covert entry, and key-control
An instructive and indispensable roadmap to locks and physical security,Tobias on Locks and Insecurity Engineering is the perfect guide for security and information technology professionals, design engineers, risk managers, law enforcement personnel, intelligence agents, regulators, policymakers, investigators, lawyers, and more.
Autorenportrait
MARC WEBER TOBIAS, J.D., is the author of eight law enforcement and security textbooks, includingLocks, Safes, and Security: An International Police Reference. He has lectured extensively, worked for government agencies as an investigator and prosecutor involved in major crimes, and has consulted with the worlds largest lock manufacturers. He has been issued 30 U.S. patents.
Inhalt
Foreword xxxiii
Introduction xxxv
Part I Locks, Safes, and Insecurity Engineering 1
Chapter 1 Insecurity Engineering and the Design of Locks 3
Chapter 2 Insecurity Engineering: A Lack of Expertise and Imagination 25
Chapter 3 Vulnerability Assessment in Lock Designs 49
Chapter 4 The 3T2R Rule for Assessing the Security of a Lock 67
Part II Legal and Regulatory Issues in Locks, Safes, and Security Systems 87
Chapter 5 Security Is All About Liability 89
Chapter 6 Legal Liability and Insecurity Engineering 103
Chapter 7 Standards for Locks and Safes 131
Chapter 8 Patents, Security, and the Protection of Intellectual Property 163
Chapter 9 Notification of Defects in Product Design 187
Chapter 10 Legal and Security Issues in Keying Systems 209
Part III Basic Designs and Technologies for Mechanical and Electronic Locks 231
Chapter 11 A Brief History of Lock Design and Development 233
Chapter 12 Industry Definitions 257
Chapter 13 Modern Locking Mechanisms: A Merging of Old and New Technology 279
Chapter 14 A Comparison of High-Security Lock Designs 317
Part IV Design and Insecure Engineering of Locks 339
Chapter 15 Attacks Against Locks: Then and Now 341
Chapter 16 An Overview: Vulnerability Analysis in Designs and Testing 379
Chapter 17 Destructive Attacks Against Locks and Related Hardware 395
Chapter 18 Covert Methods of Entry 417
Chapter 19 Attacks Against Electronic Locks 445
Chapter 20 Advanced Attacks Against High-Security Locks 459
Part V Attacks on Key Control and Special Keying Systems 475
Chapter 21 Attacking Keys and Keying Systems 477
Chapter 22 Advanced Attacks on Key Control: 3D Printers and Special Software 507
Chapter 23 Digital Fingerprints of Locks: Electronic Decoding Systems 523
Chapter 24 Code-Setting Keys: A Case Study of an Attack on High-Security Key Control 537
Part VI Specific Case Examples 545
Chapter 25 Case Examples from Part VII Rules 547
Chapter 26 Case Examples By Category 571
Part VII Design Rules, Axioms, and Principles 597
Chapter 27 Design Rules, Axioms, and Guidelines 599
Epilogue 625
Appendix A Patents Issued 627
Appendix B Trademark Listing 629
Index 633
Informationen zu E-Books
„E-Book“ steht für digitales Buch. Um diese Art von Büchern lesen zu können wird entweder eine spezielle Software für Computer, Tablets und Smartphones oder ein E-Book Reader benötigt. Da viele verschiedene Formate (Dateien) für E-Books existieren, gilt es dabei, einiges zu beachten.
Von uns werden digitale Bücher in drei Formaten ausgeliefert. Die Formate sind EPUB mit DRM (Digital Rights Management), EPUB ohne DRM und PDF. Bei den Formaten PDF und EPUB ohne DRM müssen Sie lediglich prüfen, ob Ihr E-Book Reader kompatibel ist. Wenn ein Format mit DRM genutzt wird, besteht zusätzlich die Notwendigkeit, dass Sie einen kostenlosen Adobe® Digital Editions Account besitzen. Wenn Sie ein E-Book, das Adobe® Digital Editions benötigt herunterladen, erhalten Sie eine ASCM-Datei, die zu Digital Editions hinzugefügt und mit Ihrem Account verknüpft werden muss. Einige E-Book Reader (zum Beispiel PocketBook Touch) unterstützen auch das direkte Eingeben der Login-Daten des Adobe Accounts – somit können diese ASCM-Dateien direkt auf das betreffende Gerät kopiert werden.
Da E-Books nur für eine begrenzte Zeit – in der Regel 6 Monate – herunterladbar sind, sollten Sie stets eine Sicherheitskopie auf einem Dauerspeicher (Festplatte, USB-Stick oder CD) vorsehen. Auch ist die Menge der Downloads auf maximal 5 begrenzt.