Your SlideShare is downloading. ×
Physical Security on the Front Lines by Deviant Ollam
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Introducing the official SlideShare app

Stunning, full-screen experience for iPhone and Android

Text the download link to your phone

Standard text messaging rates apply

Physical Security on the Front Lines by Deviant Ollam

558
views

Published on

Physical Security on the Front Lines by Deviant Ollam

Physical Security on the Front Lines by Deviant Ollam

Published in: Technology, Business

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
558
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Deviant Ollamhttp://enterthecor
  • 2. Typical Office Locks Deviant Ollam http://enterthecor
  • 3. But Why Not JustBypass the Lock ?
  • 4. Door Bypassing Deviant Ollam http://enterthecor
  • 5. Door Bypassing Carolina Roller Co. Traveler Hook Deviant Ollam http://enterthecor
  • 6. Door Bypassing Deviant Ollam http://enterthecor
  • 7. Door Bypassing Deviant Ollam http://enterthecor
  • 8. Door Bypassing Deviant Ollam http://enterthecor
  • 9. Door Bypassing Deviant Ollam http://enterthecor
  • 10. Door Bypassing Deviant Ollam http://enterthecor
  • 11. Door Bypassing Deviant Ollam http://enterthecor
  • 12. Mitigation: Security Astragal Deviant Ollam http://enterthecor
  • 13. Attacks with Wire
  • 14. Attack Wires Deviant Ollam http://enterthecor
  • 15. Attack Wires Deviant Ollam http://enterthecor
  • 16. Always ConsiderUnexpected Attacks
  • 17. Unexpected Attack Vectors Deviant Ollam http://enterthecor
  • 18. Unexpected Attack Vectors Deviant Ollam http://enterthecor
  • 19. Unexpected Attack Vectors Deviant Ollam http://enterthecor
  • 20. Unexpected Attack Vectors Deviant Ollam http://enterthecor
  • 21. Unexpected Attack Vectors Deviant Ollam http://enterthecor
  • 22. Unexpected Attack Vectors Deviant Ollam http://enterthecor
  • 23. Unexpected Attack Vectors Deviant Ollam http://enterthecor
  • 24. Handle Rapping
  • 25. Handle Rapping Deviant Ollam http://enterthecor
  • 26. Handle Rapping Deviant Ollam http://enterthecor
  • 27. More Bypassing
  • 28. Door Bypassing Deviant Ollam http://enterthecor
  • 29. Door Bypassing Deviant Ollam http://enterthecor
  • 30. Door Bypassing Deviant Ollam http://enterthecor
  • 31. Door Bypassing Deviant Ollam http://enterthecor
  • 32. Mitigation: Stop Bar AcrossFloor Deviant Ollam http://enterthecor
  • 33. Mitigation: Security Door Bottom Deviant Ollam http://enterthecor
  • 34. Mitigation: Security Door Bottom Deviant Ollam http://enterthecor
  • 35. Even Air as a Threat !
  • 36. Attacking with Air Deviant Ollam http://enterthecor
  • 37. Attacking with Air Deviant Ollam http://enterthecor
  • 38. Attacking with Air Deviant Ollam http://enterthecor
  • 39. Attacking with Air Deviant Ollam http://enterthecor
  • 40. Passive Exit Systems Deviant Ollam http://enterthecor
  • 41. Passive Exit Systems Deviant Ollam http://enterthecor
  • 42. Passive Exit Systems Deviant Ollam http://enterthecor
  • 43. Passive Exit Systems Deviant Ollam http://enterthecor
  • 44. Passive Exit Systems Deviant Ollam http://enterthecor
  • 45. Secure Exit Systems Deviant Ollam http://enterthecor
  • 46. Within the Wires
  • 47. Zac Franken & Adam Laurie… Gecko& Chameleon Deviant Ollam http://enterthecor
  • 48. Zac Franken & Adam Laurie… Gecko& Chameleon Deviant Ollam http://enterthecor
  • 49. Bad RFID Reader Security Deviant Ollam http://enterthecor
  • 50. Bad RFID Reader Security Deviant Ollam http://enterthecor
  • 51. Bad RFID Reader Security Deviant Ollam http://enterthecor
  • 52. Bad RFID Reader Security Deviant Ollam http://enterthecor
  • 53. Defensive Posture
  • 54. Anyone who’s been in the fieldknows the Three B’s Deviant Ollam http://enterthecor
  • 55. This 240 Gunner has all Three B’s Deviant Ollam http://enterthecor
  • 56. Bullets Deviant Ollam http://enterthecor
  • 57. Buddies Deviant Ollam http://enterthecor
  • 58. Body Armor Deviant Ollam http://enterthecor
  • 59. (And Ballistic Cover) Deviant Ollam http://enterthecor
  • 60. These Principles are Universal Deviant Ollam http://enterthecor
  • 61. Three B’s in INFOSEC Deviant Ollam http://enterthecor
  • 62. Three B’s in INFOSEC Deviant Ollam http://enterthecor
  • 63. Three B’s in INFOSEC Deviant Ollam http://enterthecor
  • 64. Three B’s in INFOSEC Deviant Ollam http://enterthecor
  • 65. Three B’s in INFOSEC Deviant Ollam http://enterthecor
  • 66. Attack Profile
  • 67. The Same Goes For Your AttackProfile… Three P’s Deviant Ollam http://enterthecor
  • 68. People, Places, Portals Deviant Ollam http://enterthecor
  • 69. People Deviant Ollam http://enterthecor
  • 70. People Deviant Ollam http://enterthecor
  • 71. People Deviant Ollam http://enterthecor
  • 72. Places Deviant Ollam http://enterthecor
  • 73. Portals Deviant Ollam http://enterthecor
  • 74. Expect Fail
  • 75. Fail Happens… Expect It Deviant Ollam http://enterthecor
  • 76. Some Failures are Minor… Deviant Ollam http://enterthecor
  • 77. Some Failures are Major… Deviant Ollam http://enterthecor
  • 78. Fail Happens… Learn From It Deviant Ollam http://enterthecor
  • 79. The “Three Rs” in the Face ofFail… Resis t Recog nize Deviant Ollam http://enterthecor
  • 80. Deviant Ollamhttp://enterthecor
  • 81. Thank You Very Much4631 Cedar AvePhiladelphia, PA 19143+1-724-613-COREhttp://enterthecore.netdelta@enterthecore.net(PGP keys on major servers) Deviant Ollam http://enterthecor