Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CAPEC-390:Bypassing Physical Security
Attack Pattern ID:390
Version:v3.9
Attack Pattern Name:Bypassing Physical Security
Abstraction:Meta
Status:Draft
Likelihood of Attack:
Typical Severity:
DetailsContent HistoryRelated WeaknessesReports
▼Description
Facilities often used layered models for physical security such as traditional locks, Electronic-based card entry systems, coupled with physical alarms. Hardware security mechanisms range from the use of computer case and cable locks as well as RFID tags for tracking computer assets. This layered approach makes it difficult for random physical security breaches to go unnoticed, but is less effective at stopping deliberate and carefully planned break-ins. Avoiding detection begins with evading building security and surveillance and methods for bypassing the electronic or physical locks which secure entry points.
▼Extended Description
▼Alternate Terms
▼Relationships
NatureTypeIDName
ParentOfS391Bypassing Physical Locks
ParentOfS395Bypassing Electronic Locks and Access Controls
CanFollowD665Exploitation of Thunderbolt Protection Flaws
Nature: ParentOf
Type: Standard
ID: 391
Name: Bypassing Physical Locks
Nature: ParentOf
Type: Standard
ID: 395
Name: Bypassing Electronic Locks and Access Controls
Nature: CanFollow
Type: Detailed
ID: 665
Name: Exploitation of Thunderbolt Protection Flaws
▼Execution Flow
▼Prerequisites
▼Skills Required
▼Resources Required
▼Indicators
▼Consequences
ScopeLikelihoodImpactNote
▼Mitigations
▼Example Instances
▼Related Weaknesses
IDName
▼Taxonomy Mappings
Taxonomy NameEntry IDEntry Name
▼Notes
▼References
Reference ID: REF-33
Title: Hacking Exposed: Network Security Secrets & Solutions
Author: Stuart McClure, Joel Scambray, George Kurtz
Publication:
Publisher:McGraw Hill
Edition:6th Edition
URL:
URL Date:
Day:N/A
Month:N/A
Year:2009
Details not found