Tobias on Locks and Insecurity Engineering

Tobias on Locks and Insecurity Engineering

Understanding and Preventing Design Vulnerabilities in Locks, Safes, and Security Hardware

Tobias, Marc Weber

John Wiley & Sons Inc

02/2024

720

Dura

9781119828259

15 a 20 dias

Descrição não disponível.
Foreword xxxiii

Introduction xxxv

Part I Locks, Safes, and Insecurity Engineering 1

Chapter 1 Insecurity Engineering and the Design of Locks 3

Chapter 2 Insecurity Engineering: A Lack of Expertise and Imagination 25

Chapter 3 Vulnerability Assessment in Lock Designs 49

Chapter 4 The 3T2R Rule for Assessing the Security of a Lock 67

Part II Legal and Regulatory Issues in Locks, Safes, and Security Systems 87

Chapter 5 Security Is All About Liability 89

Chapter 6 Legal Liability and Insecurity Engineering 103

Chapter 7 Standards for Locks and Safes 131

Chapter 8 Patents, Security, and the Protection of Intellectual Property 163

Chapter 9 Notification of Defects in Product Design 187

Chapter 10 Legal and Security Issues in Keying Systems 209

Part III Basic Designs and Technologies for Mechanical and Electronic Locks 231

Chapter 11 A Brief History of Lock Design and Development 233

Chapter 12 Industry Definitions 257

Chapter 13 Modern Locking Mechanisms: A Merging of Old and New Technology 279

Chapter 14 A Comparison of High-Security Lock Designs 317

Part IV Design and Insecure Engineering of Locks 339

Chapter 15 Attacks Against Locks: Then and Now 341

Chapter 16 An Overview: Vulnerability Analysis in Designs and Testing 379

Chapter 17 Destructive Attacks Against Locks and Related Hardware 395

Chapter 18 Covert Methods of Entry 417

Chapter 19 Attacks Against Electronic Locks 445

Chapter 20 Advanced Attacks Against High-Security Locks 459

Part V Attacks on Key Control and Special Keying Systems 475

Chapter 21 Attacking Keys and Keying Systems 477

Chapter 22 Advanced Attacks on Key Control: 3D Printers and Special Software 507

Chapter 23 Digital Fingerprints of Locks: Electronic Decoding Systems 523

Chapter 24 Code-Setting Keys: A Case Study of an Attack on High-Security Key Control 537

Part VI Specific Case Examples 545

Chapter 25 Case Examples from Part VII Rules 547

Chapter 26 Case Examples By Category 571

Part VII Design Rules, Axioms, and Principles 597

Chapter 27 Design Rules, Axioms, and Guidelines 599

Epilogue 625

Appendix A Patents Issued 627

Appendix B Trademark Listing 629

Index 633
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
Lock security; lockpicking; defeating locks; physical security; physical security engineering; lock design; lock decoding; lockpicking strategies; lockpicking methods; lockpicking techniques; 3D printing keys; key control; 3D printed keys