Keys to the Kingdom by Deviant Ollam
Author:Deviant Ollam
Language: eng
Format: epub
ISBN: 9780123979308
Publisher: Elsevier Inc.
Published: 2012-07-31T16:00:00+00:00
How Master-Keying Works
I would like to paint for you a picture of a hypothetical office. There are a number of fictional people working there every day, each with their own rights and privileges. We will examine them through a look at their keys and their locks. Hopefully the associated diagrams will help you to follow along. It is my goal that these images will make it at least partially clear to you how master-keying is implemented in basic, pin tumbler locks.
In this office we will begin by examining the keys of four individuals: Alice, Andy, Bob, and Charlie. The first three are general office workers. Alice and Andy have offices right near each other on the same floor. Bob works with somewhat more sensitive information than Alice and Andy, and his office is in another part of the building. Charlie does not have to put on a suit and tie when he goes to work in the morning, as he is part of the maintenance staff. Charlie’s duties routinely take him through the area where Alice and Andy work, and his key is able to open all the doors on their floor… but Charlie cannot access Bob’s office. In a managerial role is Don, whose space is kept rather private. Only Don and his personal assistant, Dawn, have keys to his corner office. Dawn’s key will only open Don’s office door… but Don’s key opens all doors. Figure 3.1 shows the keys used by some of these employees. How is this possible?
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Effective Threat Investigation for SOC Analysts by Yahia Mostafa;(6625)
Practical Memory Forensics by Svetlana Ostrovskaya & Oleg Skulkin(6347)
Machine Learning Security Principles by John Paul Mueller(6318)
Attacking and Exploiting Modern Web Applications by Simone Onofri & Donato Onofri(5990)
Operationalizing Threat Intelligence by Kyle Wilhoit & Joseph Opacki(5950)
Solidity Programming Essentials by Ritesh Modi(4066)
Microsoft 365 Security, Compliance, and Identity Administration by Peter Rising(3705)
Operationalizing Threat Intelligence by Joseph Opacki Kyle Wilhoit(3434)
Mastering Python for Networking and Security by José Manuel Ortega(3359)
Future Crimes by Marc Goodman(3351)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3337)
Blockchain Basics by Daniel Drescher(3308)
Learn Computer Forensics - Second Edition by William Oettinger(3193)
Incident Response with Threat Intelligence by Roberto Martínez(2924)
Mobile App Reverse Engineering by Abhinav Mishra(2889)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2873)
The Code Book by Simon Singh(2835)
Building a Next-Gen SOC with IBM QRadar: Accelerate your security operations and detect cyber threats effectively by Ashish M Kothekar(2805)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(2787)
