The Four Types of Locks

Size: px
Start display at page:

Download "The Four Types of Locks"

Transcription

1 The Four Types of Locks by Event Name XXXX-XX-XX

2 Who am i?

3 Who am i?

4 Who am i? auditing assessments research trainings

5 Who am i? auditing assessments research trainings workshops public lectures lockpick village contests & games

6 Who am i?

7 Who am i?

8 Who am i?

9 But on to locks

10 But on to locks why do they matter?

11

12

13

14

15 All your hard work here

16 All your hard work here gets undermined here

17 The Lowest Grade of Lock a.k.a. The Locks That You Are Probably Using

18 Pin Tumbler Locks

19 Pin Tumbler Locks

20 Pin Tumbler Locks

21

22

23

24

25 Pin Stacks

26 Key Operation

27 Bitting Too Low

28 Bitting Too High

29 In a Perfect World

30 In the Real World

31 In the Real World

32 In the Real World

33

34

35 Lifting Picking

36 Raking

37 Wafer Locks

38 Wafer Locks

39 Wafer Locks

40 Wafer Locks

41 Raking & Jiggling

42 Shimming

43 Bumping

44 Bumping

45 Pick Guns

46 Bump Key Attack Pull Method

47 Bump Key Attack Push Method

48 Bump Key Attack Push Method

49 Where are you using these weak locks?

50 Outdoor Rugged Locks

51 Outdoor Rugged Locks

52 Outdoor Rugged Locks

53 Outdoor Rugged Locks

54 Outdoor Rugged Locks

55 Outdoor Rugged Locks

56 Desk Drawers & Filing Cabinets

57 Power Panels

58 Sensitive Wiring

59 Sensitive Wiring

60 Sensitive Wiring

61 Why are most locks this bad?

62 It s a Problem of Standards American National Standards Institute Classification A156 No Covert Security Ratings At All American Society for Testing Materials Classification F883 Toughest Rating is only 15 minutes

63 Many Times, Picking is Instantaneous

64 You Need a Response Window

65 One Step Up Pick Resistant Locks

66 Advanced Keyways Simple straight and wide

67 Advanced Keyways Simple Medium straight and wide straight but narrow

68 Advanced Keyways Simple Medium Complex straight and wide straight but narrow thinner and curvy

69 Advanced Keyways Simple Medium Complex Harder straight and wide straight but narrow thinner and curvy lots of angles

70 Advanced Keyways Simple Medium Complex Harder Fiendish straight and wide straight but narrow thinner and curvy lots of angles overlapping wards

71 Un-Shimmable Padlocks

72 Pick Resistant Pins

73 Pick Resistant Pins

74 Pick Resistant Pins

75 Pick Resistant Pins

76 Pick Resistant Pins

77 Bump-Resistant Pins Top Gapping

78 Bump-Resistant Pins Anti-Bump Driver Pin

79 The Next Step Up High Security Locks

80 Side Pin Schlage Everest pin springs driver (top) pins key (bottom) pins plug check pin spring check pin specialized key

81 Side Pin Schlage Everest photos courtesy of Matt Blaze

82 Side Pin Schlage Everest photos courtesy of Matt Blaze

83 Side Pin Schlage Everest specialized finger tensioner modified Everest key

84 Side Bars Similar to side pins Restrict plug movement Harder to pick than pin stacks

85 Side Bars Finger Pins

86 Side Bars Finger Pins

87 Side Bars Finger Pins Schlage Primus

88 Side Bars Sliders

89 Side Bars Sliders

90 Side Bars Rotating Pins

91 Side Bars Rotating Pins

92 Rotating Pins Medeco Locks Medeco plug exposed, key pins rotating to align sidebar cuts Top View Side View

93 Rotating Pins Medeco locks certainly not unpickable Can be picked Can be bumped Numerous weaknesses Open in 30 Seconds Marc Tobias Tobias Bluzmanis

94 Rotating Disks Sometimes Very Good Security Mimics a safe lock Difficult To Pick Takes much time and great skill Specialized tools required

95 Rotating Disks Sometimes Very Good Security Mimics a safe lock Difficult To Pick Takes much time and great skill Specialized tools required Two-in-One Tool Manipulates disks individually Decodes cut positions Barry Wels picking a rotating disk lock with Mike Glasser

96 The Highest Grade Dare we say unpickable locks?

97 Specialized Rotating Disks Abloy Protec Not just rotating disks Disk blocking mechanism Unpickable? Closest I ever come to using that word Two-in-one tools cannot be used

98 Certain Magnetic Locks Miwa Japanese company Array of magnetic pins Simple North / South Evva MCS Austrian company Axial-rotated magnets Interaction with sidebar

99 Evva Magnetic Code System Possibly the most duplication-resistant lock

100 No Known Attack or Bypass Protec MCS

101 What About Safes? photo courtesy of Don the Shadow

102 What About Safes?

103 What About Safes? S&G 8400

104 What About Safes? photo courtesy of Barry Wels

105 What About Safes?

106 But what about destructive entry?

107

108

109

110

111

112 There s one upshot you know it happened

113 The scarier risk is non-destructive entry

114

115

116

117 Different locks for different purposes

118 1. Basic Locks No special protections No bypassing resistance Unskilled Attacker basic tools & techniques, under 5 minutes Skilled Attacker basic tools & techniques, under 5 minutes

119 2. Resistant Locks Some pick-resistant pins (possibly tighter keyway) Bump resistant, Zero potential of shimming or over lifting Unskilled Attacker basic tools & techniques, more than 5 minutes Skilled Attacker basic tools & techniques, under 5 minutes

120 3. High Security Locks Advanced pick resistance, possibly wholly new mechanisms Zero potential of shimming or over lifting or bumping Unskilled Attacker no chance in less than 30 minutes Skilled Attacker special tools & techniques, at least 5 minutes

121 4. Unpickable Locks Advanced pick resistance, possibly wholly new mechanisms No potential of shimming or over lifting / Bump resistance Unskilled Attacker no chance at all Skilled Attacker highly special tools & techniques, at least 30 minutes (and quite possibly a lot of disturbance created)

122

123

124

125

126

127

128

129

130

131 Protecting against force or finesse?

132 A New Physical Security Framework Three Types of Secured Area External Access Internal Access Sensitive Access Which Locks Go Where?

133 A New Physical Security Framework Basic Locks Utterly unacceptable Should be removed, in my view False sense of security Inevitable cross-contamination X

134 Cross Contamination with Locks

135 Cross Contamination with Locks

136 Cross Contamination with Locks

137 Cross Contamination with Locks

138 Cross Contamination with Locks

139 Cross Contamination with Locks

140 Cross Contamination with Locks

141 A New Physical Security Framework Basic Locks Utterly unacceptable Should be removed, in my view False sense of security Inevitable cross-contamination X

142 A New Physical Security Framework External Access Personnel Doors Wiring / Utilities Susceptible to Vandals & Thugs High Security Locks Should Be Required X

143 A New Physical Security Framework Internal Access Office Doors Closets Protecting Privacy & Supplies, not Data Pick Resistant Locks Are Acceptable X

144 A New Physical Security Framework Sensitive Access Server Racks Networking Equipment Any Termination-Worthy Data Unpickable Locks Should Be Used X

145 To Me, a Proper Lock Should Be Totally Immune to Zero-Skill Attacks Resist Skilled Tactics for Thirty Minutes Leave Behind Clear Signs of Tampering

146 Security is only as effective as the people behind it

147 Social Engineering

148 Social Engineering

149 Social Engineering

150 Social Engineering Preparedness Stop

151 Social Engineering Preparedness Stop Challenge

152 Social Engineering Preparedness Stop Challenge Authenticate

153 Social Engineering Preparedness Stop Challenge Authenticate

154 Social Engineering Preparedness Stop Challenge Authenticate then you follow this with Reward

155 Social Engineering

156 Social Engineering

157 Forensic Evidence

158 Forensic Evidence

159 Forensic Evidence

160 Forensic Evidence

161 Forensic Evidence 250 uses

162 Forensic Evidence 1,500 uses

163 Forensic Evidence 5,000 uses

164 Forensic Evidence 250 uses

165 Forensic Evidence 1,500 uses

166 Forensic Evidence 5,000 uses

167 Forensic Evidence

168 Forensic Evidence

169 Forensic Evidence

170 Forensic Evidence

171 Forensic Evidence

172 Forensic Evidence picking

173 Forensic Evidence raking

174 Forensic Evidence both

175 Forensic Evidence ugh

176 Forensic Evidence wow

177 Forensic Evidence

178 Forensic Evidence pin sides

179 Forensic Evidence

180 Forensic Evidence

181 Forensic Evidence tail cam

182 Forensic Evidence

183 Forensic Evidence

184 Forensic Evidence

185 Forensic Evidence

186 Forensic Evidence

187 Forensic Evidence

188 Forensic Evidence bumping

189 Forensic Evidence bumping

190 Forensic Evidence

191 Forensic Evidence

192 Forensic Evidence

193 Forensic Evidence Sometimes major insurance implications Suspect something fishy? Don t compromise the scene Contact a professional Forensic Locksmith vs. Yellow-Pages Locksmith Having newer locks matters Age makes for a mess, internally Also your locks should be updated as a matter of routine The facts are out there!

194 So Which Locks are Which? Unpickable High Security Resistant Protec (rotating disks) MCS (magnetic) MT5 and MT5+ (electronic safe dials) Granit & Diskus (rotating disk) Twin (counter-milling, finger pins) 3KS (sliders), DPI (new models) Primus (if upgraded properly) Padlocks (heavy duty models) Interchangeable Cores (modern models)

195 Thank you so much. Thank you to TOOOL, Babak, Dave, Steve, JVR, Mouse, Mr. E, Barry & Han, Laz, Valanx & the FOOLS, Datagram, Matt Blaze, Jackalope, Renderman, Bruce & Heidi and especially Daisy

196 So Which Locks are Which? Unpickable High Security Resistant Protec (rotating disks) MCS (magnetic) MT5 and MT5+ (electronic safe dials) Granit & Diskus (rotating disk) Twin (counter-milling, finger pins) 3KS (sliders), DPI (new models) Primus (if upgraded properly) Padlocks (heavy duty models) Interchangeable Cores (modern models) this presentation is CopyLeft by. you are free to reuse any or all of this material as long as it is attributed and freedom for others to do the same is maintained

Exploiting vulnerabilities in mechanical access controls for nondestructive

Exploiting vulnerabilities in mechanical access controls for nondestructive Locked Secure Exploiting vulnerabilities in mechanical access controls for nondestructive entry Diagrams used with kind permission of Deviant Ollam http://deviating.net/lockpicking/ Purpose To assess the

More information

Things that go BUMP in the Night:

Things that go BUMP in the Night: Things that go BUMP in the Night: An analysis of current and emerging threats to Physical Security Marc Weber Tobias Matt Fiddler Types of Locks Warded Lever Wafer and Disc Tumbler Pin Tumbler Hybrid:

More information

High Insecurity Locks: What you Need to Know about Locks, Lies, and Liability. Marc Weber Tobias

High Insecurity Locks: What you Need to Know about Locks, Lies, and Liability. Marc Weber Tobias High Insecurity Locks: What you Need to Know about Locks, Lies, and Liability Marc Weber Tobias Agenda Conventional v. High Security Locks Security Standards Conventional and High Security UL-437 ANSI

More information

Lock Picking and Physical Security. Tyler Nighswander

Lock Picking and Physical Security. Tyler Nighswander Lock Picking and Physical Security Tyler Nighswander Lock Picking and Physical Security Tyler Nighswander Introduction Who I am: PPP member (specializes in crypto and hardware interested in everything!)

More information

DuraCam II Removable Core Cam Lock

DuraCam II Removable Core Cam Lock DuraCam II Removable Core Cam Lock Medeco s DuraCam series of cam locks with the removable core function is the ultimate security solution for the gaming industry. With a 1/8'' thick key cut on the broad

More information

Cryptology and Physical Security: Rights Amplification in Master-Keyed Mechanical Locks

Cryptology and Physical Security: Rights Amplification in Master-Keyed Mechanical Locks Cryptology and Physical Security: Rights Amplification in Master-Keyed Mechanical Locks Matt Blaze AT&T Labs Research mab@crypto.com, mab@research.att.com 15 September 2002 PREPRINT: This paper can be

More information

B600/700/800-Series. Pictured here: B600 (Grade 1) deadbolt with D-Series Orbit knob shown in 626 Satin Chrome

B600/700/800-Series. Pictured here: B600 (Grade 1) deadbolt with D-Series Orbit knob shown in 626 Satin Chrome B600/700/800-Series The B600/700/800-Series are Schlage s highest grade deadbolt locks. Choose the 600 for Grade 1 security in high-traffic commercial applications. Choose the 700 or 800 and get standard

More information

Lockpicking. ), and I (Cliffe) will try to address any issues. Note that your

Lockpicking. ), and I (Cliffe) will try to address any issues. Note that your Lockpicking License This work by Z. Cliffe Schreuders at Leeds Metropolitan University is licensed under a Creative Commons Attribution-ShareAlike 3.0 Unported License. Contents License Contents General

More information

Cam, Cabinet & Switch Locks

Cam, Cabinet & Switch Locks 132 Cam, Cabinet & Switch Locks Cam, Cabinet & Switch Locks FEATURES Medeco 3 Logic Medeco XT Easily integrated into existing cam lock master key systems Easy installation Completely serviceable and may

More information

Why choose Medeco? Medeco Security Locks A History of High Security and Innovation

Why choose Medeco? Medeco Security Locks A History of High Security and Innovation Medeco Logic Why choose Medeco? Since its inception in 1968, Medeco has been a pioneer in the locking industry and a trusted partner to provide enhanced security and accountability solutions. With more

More information

E-Plex. E-Plex 5000 Power up your access control

E-Plex. E-Plex 5000 Power up your access control 5000 Power up your access control 1 5000 Simple to install, use and maintain Requires no wire through the door 100 access codes Extensive audit trail Programmable passage mode Optional easy-to-use Excel

More information

INSECURITY ENGINEERING: Locks, Lies, and Videotape

INSECURITY ENGINEERING: Locks, Lies, and Videotape INSECURITY ENGINEERING: Locks, Lies, and Videotape LOCK DESIGN: MECHANICAL v. SECURITY ENGINEERING PRIOR DefCon PRESENTATIONS Vulnerabilities in mechanical and electromechanical locks Resulted from Defective

More information

B600/700/800 Series. The B600/700/800 Series are Schlage s highest grade deadbolt

B600/700/800 Series. The B600/700/800 Series are Schlage s highest grade deadbolt B600/700/800 Series The B600/700/800 Series are s highest grade deadbolt locks. Choose the 600 for Grade 1 security in high-traffic commercial applications. Choose the 700 or 800 and get standard a Primus

More information

ROYAL CANADIAN MOUNTED POLICE TECHNICAL SECURITY BRANCH TECHNICAL OPERATIONS OTTAWA, ONTARIO K1A 0R2

ROYAL CANADIAN MOUNTED POLICE TECHNICAL SECURITY BRANCH TECHNICAL OPERATIONS OTTAWA, ONTARIO K1A 0R2 ROYAL CANADIAN MOUNTED POLICE TECHNICAL SECURITY BRANCH TECHNICAL OPERATIONS OTTAWA, ONTARIO K1A 0R2 SECURITY GUIDE TSB/SG-10 MASTER KEY SYSTEMS DECEMBER 1981 Any suggested r ev i s i ons and comments

More information

CyberLock How does it work? CyberLock electronic cylinders replace standard mechanical cylinders. No wiring or battery is required at the lock.

CyberLock How does it work? CyberLock electronic cylinders replace standard mechanical cylinders. No wiring or battery is required at the lock. CyberLock an innovative lock system that easily converts existing mechanical locks into an access control system. With electronic lock cylinders, programmable CyberKeys, and CyberAudit software, you can

More information

TAKE ThE NExT STEp and Better Secure Your Facility

TAKE ThE NExT STEp and Better Secure Your Facility TAKE ThE NExT STEp and Better Secure Your Facility Facility Facility security security must be must constantly be constantly assessed assessed and improved. and improved. The patented The patented American

More information

Pyramid. Cylinder & Key Control Products

Pyramid. Cylinder & Key Control Products Copyright 2007, 2009, Sargent Manufacturing Company, an ASSA ABLOY Group company. All rights reserved. Reproduction in whole or in part without the express written permission of Sargent Manufacturing Company

More information

Choosing the Right Credentials Is Easier than You Think

Choosing the Right Credentials Is Easier than You Think Choosing the Right Credentials Is Easier than You Think Jennifer Toscano, Ingersoll Rand Security Technologies, Portfolio Marketing Manager, Credentials, Readers, Software, and Controls Security is complicated.

More information

EASY TO INSTALL, EASY TO MAINTAIN

EASY TO INSTALL, EASY TO MAINTAIN 5000 Series The Simplex and E-Plex 5000 Series is the complete toolkit for all your access control needs. Built on five decades of reliable and convenient keyless entry, this Series provides everything

More information

The Medeco Solution for Controlled Access and Accountability

The Medeco Solution for Controlled Access and Accountability Medeco XT The Medeco Solution for Controlled Access and Accountability Medeco XT is a powerful Intelligent Key System that uses innovative technology to deliver a flexible, cost-effective solution for

More information

Kaba keyswitches. Providing solutions where secure control of switching is required

Kaba keyswitches. Providing solutions where secure control of switching is required Kaba keyswitches Providing solutions where secure control of switching is required Whatever your industry the key is Kaba The Kaba Group is a globally active security company, first established in Zurich,

More information

Codringtons CAM LOCKS. Anker Project Magnet Magnet-K Infinity ABA. Cam Bi Lock B5/32199 Enfield A500 A520 5 Pin 6 Pin Federal CM-01 Meroni 2651

Codringtons CAM LOCKS. Anker Project Magnet Magnet-K Infinity ABA. Cam Bi Lock B5/32199 Enfield A500 A520 5 Pin 6 Pin Federal CM-01 Meroni 2651 Codringtons CAM LOCKS Project Magnet Magnet-K Infinity ABA Cam Bi Lock B5/32199 A500 A520 5 Pin 6 Pin Federal CM-01 Meroni 2651 Magnet Project Infinity ABA Cam Bi Lock B5/32199 Codringtons Cam Locks As

More information

Lock and Key Systems. The lock is the most accepted and. Chapter 8

Lock and Key Systems. The lock is the most accepted and. Chapter 8 Chapter 8 Lock and Key Systems The lock is the most accepted and widely used security device of the basic safeguards in protecting installations and activities, personnel, classified material, and government

More information

ASSA CLIQ. Electromechanical master keying

ASSA CLIQ. Electromechanical master keying ASSA CLIQ Electromechanical master keying If these are your problems... Lost or stolen keys, and illicit copies of keys in circulation Leading to an increased risk of theft, intrusion or attacks on staff

More information

SMART FORCE AND TORQUE SENSORS. User s Guide

SMART FORCE AND TORQUE SENSORS. User s Guide SMART FORCE AND TORQUE SENSORS Thank you Thank you for purchasing a Mark-10 Plug & Test TM remote sensor, designed for use with Mark-10 models 7i, 5i and 3i force/torque indicators. With proper usage,

More information

E70 EntryCheckTM. Electronic Lock

E70 EntryCheckTM. Electronic Lock E70 EntryCheckTM Electronic Lock E70K Series - Digital Keypad Entry E70P Series - ProxCard Only or ProxCard and PIN Entry HID ProxCard, Tag or Key Fob Compatible 320 to 3000 user capability Electronic

More information

Canada Post Community Mailbox User Guide

Canada Post Community Mailbox User Guide Canada Post Community Mailbox User Guide My community mailbox location: My module #: My compartment #: Designed for the changing needs of Canadians. Module Number With Canadians mailing less and less each

More information

10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS

10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS 10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS WHITE PAPER INTRODUCTION BANKS ARE A COMMON TARGET FOR CYBER CRIMINALS AND OVER THE LAST YEAR, FIREEYE HAS BEEN HELPING CUSTOMERS RESPOND

More information

MULTI-FAMILY & LIGHT COMMERCIAL

MULTI-FAMILY & LIGHT COMMERCIAL MULTI-FAMILY & LIGHT COMMERCIAL We re the lock brand that works hard to understand the world you live in so that we can do everything we can to protect it. Our products provide customers with the quality,

More information

OUTDOOR SECURITY CATALOGUE 2015/16

OUTDOOR SECURITY CATALOGUE 2015/16 OUTDOOR SECURITY CATALOGUE 2015/16 Introduction Eurospec was formed in 1997 as a subsidiary of Carlisle Brass specialising in the commercial sector of the architectural ironmongery market. Following the

More information

1.1 Un-Boxing Your BoXZY

1.1 Un-Boxing Your BoXZY 1.1 Un-Boxing Your BoXZY This manual explains how to un-box your BoXZY and set up your work area. Written By: BoXZY 2017 boxzy.dozuki.com Page 1 of 9 INTRODUCTION Please read the following manual and wiki

More information

Medeco XT RoUTe ANd ReVeNUe SecURITY SoLUTIoNS

Medeco XT RoUTe ANd ReVeNUe SecURITY SoLUTIoNS Medeco XT ROUTE AND REVENUE SECURITY SOLUTIONS Intelligent Security for Route and Revenue Control Medeco XT is a robust electronic locking and access management system for vending equipment and facilities.

More information

HOW TO INSTALL AND REMOVE SPECIAL CONNECTORS Low Fit and Lever Type Connector

HOW TO INSTALL AND REMOVE SPECIAL CONNECTORS Low Fit and Lever Type Connector B 47 HOW TO INSTALL AND REMOVE SPECIAL CONNECTORS Low Fit and Type Connector [Case 1] (1) Push the place indicated by the arrow. (2) The lock is released and lever is lifted up. (3) Lift the lever up until

More information

Pyramid. Cylinder & Key Control Products

Pyramid. Cylinder & Key Control Products Copyright 2007, 2009, 2010, Sargent Manufacturing Company, an ASSA ABLOY Group company. All rights reserved. Reproduction in whole or in part without the express written permission of Sargent Manufacturing

More information

E70 EntryCheck TM Electronic Lock

E70 EntryCheck TM Electronic Lock E70 EntryCheck TM Electronic Lock Electronic Digital Door Locks E70-64 64 Users / 64 Event Audit Trail E70-150 160 Users / 832 Event Audit Trail E70-300 320 Users / 1600 Event Audit Trail E70-500 512 Users

More information

Yale KeyMark Service Manual. Protected Keyway Cylinder. An ASSA ABLOY Group brand

Yale KeyMark Service Manual. Protected Keyway Cylinder. An ASSA ABLOY Group brand Yale KeyMark Service Manual Protected Keyway Cylinder An ASSA ABLOY Group brand table of contents The Security Leg... 2 Cylinder Exploded Views and Part Numbers... 3-6 Parts Breakdown.... 7 Pin Specifications...

More information

BP-BLUE PUNCH Key Machine

BP-BLUE PUNCH Key Machine BP-BLUE PUNCH Key Machine Heavy duty and built to last! The Blue Punch key machine is a dedicated key punch machine designed to provide factory original keys at the speed of a duplicator. The Blue Punch

More information

Why should I choose CertBlaster practice tests?

Why should I choose CertBlaster practice tests? Why should I choose CertBlaster practice tests? CertBlaster Test Structure The CertBlaster test structure shows our clearly manic focus on two things: 1) Exam Simulation, and 2) Exam Objectives. In below

More information

Cabinet Lock Overview ELECTRONIC SECURITY HARDWARE HES & SECURITRON MEDECO

Cabinet Lock Overview ELECTRONIC SECURITY HARDWARE HES & SECURITRON MEDECO Cabinet Lock Overview ELECTRONIC SECURITY HARDWARE HES & SECURITRON MEDECO Flexible Scalable Repeatable As the access control industry continues to evolve, non-traditional openings such as cabinets represent

More information

Best Practices in Securing a Multicloud World

Best Practices in Securing a Multicloud World Best Practices in Securing a Multicloud World Actions to take now to protect data, applications, and workloads We live in a multicloud world. A world where a multitude of offerings from Cloud Service Providers

More information

The Residence Hall Security System That So You Don't Have To.

The Residence Hall Security System That So You Don't Have To. The Residence Hall Security System That So You Don't Have To. G Introducing B.A.S.I.S. From Best Access Systems Best Access Systems Integrated Solutions Guest Housing Product B.A.S.I.S. G Making Students

More information

Installation Instructions

Installation Instructions Installation Instructions Biometric Keypad Mounting Considerations Always refer to the installation and operating instructions for the lock and keypad before attempting installation of any of the components.

More information

Choosing a sophisticated locking system: Where security is an issue, compromise is simply not an option

Choosing a sophisticated locking system: Where security is an issue, compromise is simply not an option Choosing a sophisticated locking system: Where security is an issue, compromise is simply not an option In a world increasingly challenged by mounting security threats, the need for comprehensive locking

More information

Mounting Accessory Guide

Mounting Accessory Guide Apr. 12 2010 Table of Contents Mounting Accessory Guide 1 Overview 5 Introduction... 5 Types of Mounting Methods... 5 Surface... 5 Wall... 5 L-Type Wall Mount (PMAX-0308) 6 Heavy Duty Wall Mounts (PMAX-0305

More information

Model XL-2 - Fluid Leak Detector

Model XL-2 - Fluid Leak Detector Model XL-2 - Fluid Leak Detector Model XL-2 Includes: (A) Instrument All controls and connections are made with the instrument, using the control panel. The instrument is housed in a rugged outdoor use

More information

HARMONi G3. Quick Start Guide for HARMONi G3. imac Processor/FireWire Upgrade

HARMONi G3. Quick Start Guide for HARMONi G3. imac Processor/FireWire Upgrade HARMONi G3 imac Processor/FireWire Upgrade imac and Operating System Compatibility The HARMONi G3 imac processor/firewire upgrade is compatible only with imac 233, 266, and 333 MHz models (Revisions A-D);

More information

Free Advice Free Quote Nationwide. Security Direct property protection. Shop Front Buying Guide SECURITY DIRECT.

Free Advice Free Quote Nationwide. Security Direct property protection. Shop Front Buying Guide SECURITY DIRECT. Security Direct property protection Free Advice Free Quote Nationwide Shop Front Buying Guide SECURITY DIRECT www.securitydirect.uk.com Shop Front Roller Shutter Buying Guide We have a very large range

More information

THE HSL SECURE KVM COMBINERS. Simultaneously interact with multiple computers on the same screen

THE HSL SECURE KVM COMBINERS. Simultaneously interact with multiple computers on the same screen THE HSL SECURE KVM COMBINERS Simultaneously interact with multiple computers on the same screen THE NEED 1 Demanding environments require real-time presentation of information from isolated computers on

More information

Electronic Key Information Booklet

Electronic Key Information Booklet Electronic Key Information Booklet Version 1, February 2013 Tel: (08) 8920 1811 Email: info@ntairports.com.au www.darwinairport.com.au CONTENTS Title Page# The EKA System... 3 Electronic Keys. 3 Opening

More information

How to Manage a Crane Accident

How to Manage a Crane Accident How to Manage a Crane Accident Guest Speaker: Joe Collins, Heavy Lift Manager, Becht Engineering Host: Mike Parnell President/CEO, ITI ASME B30 Vice Chair (Cranes & Rigging) ASME P30 Chair (Lift Planning)

More information

PROTECT and SHOWCASE your investments! Water Proof Tamper Proof Dust Proof Weather Proof

PROTECT and SHOWCASE your investments! Water Proof Tamper Proof Dust Proof Weather Proof 866.646.4383 Water Proof Tamper Proof Dust Proof Weather Proof PC Defender This water, dust and tamper proof LCD / PC enclosure solution is great cost and space saver and may be mounted on a wall or on

More information

Free Advice Free Quote Nationwide. Security Direct property protection. Bar and Servery Buying Guide SECURITY DIRECT.

Free Advice Free Quote Nationwide. Security Direct property protection. Bar and Servery Buying Guide SECURITY DIRECT. Security Direct property protection Free Advice Free Quote Nationwide Bar and Servery Buying Guide SECURITY DIRECT www.securitydirect.uk.com Bar and Serveries Roller Shutter Buying Guide We have a very

More information

Respond quickly to security threats, lost or stolen keys, or personnel changes without the added cost of changing your locks and keys.

Respond quickly to security threats, lost or stolen keys, or personnel changes without the added cost of changing your locks and keys. Medeco CLIQ The Medeco Solution Medeco CLIQ is an Intelligent Key locking and access control solution, combining electronic and mechanical technologies. Managed via cloud-based software, Medeco CLIQ provides

More information

Ritelock Pro. icode Programming Guide. (Version 1.XX) 1 User Guide Ritenergy International, LLC

Ritelock Pro. icode Programming Guide. (Version 1.XX) 1 User Guide Ritenergy International, LLC Ritelock Pro (Version 1.XX) icode Programming Guide 1 User Guide Ritenergy International, LLC TABLE OF CONTENTS RITELOCK PRO PROGRAMMING GUIDE 3 System Requirement 3 System Components 3 Programming with

More information

GIVING APPLEPAY THE FINGER

GIVING APPLEPAY THE FINGER GIVING APPLEPAY THE FINGER Hacking TouchID on the iphone 6 Marc Rogers - Cloudflare marc@cloudflare.com BIOMETRICS - A QUICK RECAP Biometrics is HARD Attacks against fingerprint based biometric systems

More information

Rethinking Authentication. Steven M. Bellovin

Rethinking Authentication. Steven M. Bellovin Rethinking Authentication Steven M. https://www.cs.columbia.edu/~smb Why? I don t think we understand the real security issues with authentication Our defenses are ad hoc I regard this as a step towards

More information

JABRA CC SERIES COMMUNICATOR

JABRA CC SERIES COMMUNICATOR JABRA CC SERIES COMMUNICATOR ENJOY HANDS-FREE COMMUNICATION A CULTURE OF SIMPLICITY JABRA COMMUNICATOR / CORDLESS HEADSET FOR CONTACT CENTRES DESIGNING A NEW COMMUNICATION EXPERIENCE The modern society

More information

Respond quickly to security threats, lost or stolen keys, or personnel changes without the added cost of changing your locks and keys.

Respond quickly to security threats, lost or stolen keys, or personnel changes without the added cost of changing your locks and keys. Medeco CLIQ The Medeco Solution Medeco CLIQ is an Intelligent Key locking and access control solution, combining electronic and mechanical technologies. Managed via cloud-based software, Medeco CLIQ provides

More information

EPS. The trusted system for affordable security

EPS. The trusted system for affordable security EPS The trusted system for affordable security EPS patented technology & versatile use Extende EPS is the classic product among mechanical master key systems. With its well-proven technology, EPS is ideally

More information

The Belkin Advanced Secure windowing kvm

The Belkin Advanced Secure windowing kvm Validated EAL 4+ The Belkin Advanced Secure windowing kvm The Current Situation There are many cases where analysts and operators need to work simultaneously with multiple computers and limited desktop

More information

MEDIUM DUTY LOGIC USER'S GUIDE CONTACT INFORMATION

MEDIUM DUTY LOGIC USER'S GUIDE CONTACT INFORMATION MEDIUM DUTY LOGIC USER'S GUIDE MH 0U MHS 0U MT 0U BMT 0U MGJ 0U MJ 0U CONTACT INFORMATION WARNING: This product can expose you to chemicals including lead, which are known to the State of California to

More information

ADOBE ILLUSTRATOR CS3

ADOBE ILLUSTRATOR CS3 ADOBE ILLUSTRATOR CS3 Chapter 2 Creating Text and Gradients Chapter 2 1 Creating type Create and Format Text Create text anywhere Select the Type Tool Click the artboard and start typing or click and drag

More information

WWW. FUSIONIO. COM. Fusion-io s Solid State Storage A New Standard for Enterprise-Class Reliability Fusion-io, All Rights Reserved.

WWW. FUSIONIO. COM. Fusion-io s Solid State Storage A New Standard for Enterprise-Class Reliability Fusion-io, All Rights Reserved. Fusion-io s Solid State Storage A New Standard for Enterprise-Class Reliability iodrive Fusion-io s Solid State Storage A New Standard for Enterprise-Class Reliability Fusion-io offers solid state storage

More information

Uncompromised Security

Uncompromised Security OVERVIEW Abloy Protec2 CLIQ Remote is the culmination of over 100 years experience in mechanical security and a decade of electronics engineering from Abloy. Overview Manage the system remotely with CLIQ

More information

Keso F1 Strengthens Key Control

Keso F1 Strengthens Key Control A Technical and Informational Newsletter From Dugmore & Duncan Fall 2005 Vol. VI - Issue IV Keso F1 Strengthens Key Control The new SARGENT Keso F1 Security System offers the building owner full control

More information

Customize Your Environment

Customize Your Environment 26 c h a p t e r 2 Customize Your Environment Every vector drawing program comes with default settings. In general, the defaults are OK, but customizing your preferences will make creating your vector

More information

On the Web sun.com/aboutsun/comm_invest STAROFFICE 8 DRAW

On the Web sun.com/aboutsun/comm_invest STAROFFICE 8 DRAW STAROFFICE 8 DRAW Graphics They say a picture is worth a thousand words. Pictures are often used along with our words for good reason. They help communicate our thoughts. They give extra information that

More information

workstation acessories ErgoChair ergonomic chair designed for the factory worker

workstation acessories ErgoChair ergonomic chair designed for the factory worker workstation acessories ErgoChair ergonomic chair ErgoChair ergonomic chair designed for the factory worker the backrest and seat foot ring adjustment ranges are designed to cover a large variety of production

More information

Sure Coat Modular Gun Control System Part C: Purge Timer Interface Card. Customer Product Manual Part B

Sure Coat Modular Gun Control System Part C: Purge Timer Interface Card. Customer Product Manual Part B Sure Coat Modular Gun Control System Part C: Purge Timer Interface Card Customer Product Manual Issued 4/03 For parts and technical support, call the Industrial Coating Systems Customer Support Center

More information

website: https://www.cctv2go.co.uk telephone: CCTV SYSTEMS

website: https://www.cctv2go.co.uk   telephone: CCTV SYSTEMS website: https://www.cctv2go.co.uk email: cctv2go@outlook.com telephone: 01785 541 912 CCTV SYSTEMS Buyers Guide 2016 TABLE OF CONTENTS CCTV Systems - An Introduction Standard v HD Definition So why HD

More information

Key Cutting Machine. Initial operation manual.

Key Cutting Machine. Initial operation manual. With its readiness to rapidly respond to any challenge, Mul-T-Lock provides peace of mind through offering comprehensive, customized, top security cylinder and locking solutions and services worldwide.

More information

Department of Management Services REQUEST FOR INFORMATION

Department of Management Services REQUEST FOR INFORMATION RESPONSE TO Department of Management Services REQUEST FOR INFORMATION Cyber-Security Assessment, Remediation, and Identity Protection, Monitoring, and Restoration Services September 3, 2015 250 South President

More information

DIRECTIVE ON INFORMATION TECHNOLOGY SECURITY FOR BANK PERSONNEL. June 14, 2018

DIRECTIVE ON INFORMATION TECHNOLOGY SECURITY FOR BANK PERSONNEL. June 14, 2018 DIRECTIVE ON INFORMATION TECHNOLOGY SECURITY FOR BANK PERSONNEL June 14, 2018 A. Overriding Objective 1.1 This Directive establishes the rules and instructions for Bank Personnel with respect to Information

More information

1TouchXL & 1TouchXLS

1TouchXL & 1TouchXLS Manual 1TouchXL & 1TouchXLS Fingerprint Lock Operator s Manual Intelligent Biometric Controls, Inc. - www.fingerprintdoorlocks.com Rev. 2.2 Introduction I II III IV V VI VII Table Of Contents Introduction

More information

Omni-Channel for Administrators

Omni-Channel for Administrators Omni-Channel for Administrators Salesforce, Winter 18 @salesforcedocs Last updated: November 2, 2017 Copyright 2000 2017 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of

More information

Parts of Computer hardware Software

Parts of Computer hardware Software Parts of Computer Parts of Computer If you use a desktop computer, you might already know that there is not any single part called the "computer." A computer is really a system of many parts working together.

More information

MotionGraphix. User Guide. Quick Start. Overview

MotionGraphix. User Guide. Quick Start. Overview MotionGraphix User Guide Quick Start Create a Project Add Elements Position, scale and rotate the elements Change the time and reposition, scale and rotate the elements Change the time again, etc. Double

More information

Sargent & Greenleaf Model 0881 Environmental Padlock By Bosnianbill

Sargent & Greenleaf Model 0881 Environmental Padlock By Bosnianbill Sargent & Greenleaf Model 0881 Environmental Padlock By Bosnianbill Background Years ago I commanded a unit located on Seneca Army Depot, in Upstate New York in the Finger Lakes area. The base was closed

More information

Enhancing Security With SQL Server How to balance the risks and rewards of using big data

Enhancing Security With SQL Server How to balance the risks and rewards of using big data Enhancing Security With SQL Server 2016 How to balance the risks and rewards of using big data Data s security demands and business opportunities With big data comes both great reward and risk. Every company

More information

CSE 3482 Introduction to Computer Security. Introduction to Information/Computer Security

CSE 3482 Introduction to Computer Security. Introduction to Information/Computer Security CSE 3482 Introduction to Computer Security Introduction to Information/Computer Security Instructor: N. Vlajic, Winter 2017 Learning Objectives Upon completion of this material, you should be able to:

More information

MD-BSL15W / SPRING-LOADED TWIN-ARM. For ( cm) LCD desktop computer. User Manual

MD-BSL15W / SPRING-LOADED TWIN-ARM. For ( cm) LCD desktop computer. User Manual MD-BSL15W / SPRING-LOADED TWIN-ARM MONITOR mount For 15 27 (38.1 68.6 cm) LCD desktop computer User Manual Thank you for choosing Gabor. The Gabor MD-BSL15W mounts two 15 27 (38.1 68.6 cm) LCD computer

More information

APES-14 HD-6500 & HD-7000 Version Operator s Training Manual

APES-14 HD-6500 & HD-7000 Version Operator s Training Manual APES-14 HD-6500 & HD-7000 Version Operator s Training Manual Issue A1 09/03 PDI Part # 900600 Performance Design Inc. 2350 East Braniff St. Boise Idaho 83716 This manual contains very important safety

More information

MIS Class 2. The Threat Environment

MIS Class 2. The Threat Environment MIS 5214 Class 2 The Threat Environment Agenda In the News Models Risk Hackers Vulnerabilities Information System Categorization Risk Assessment Exercise Conceptual Modeling and Information Systems In

More information

Unit 2 Essentials of cyber security

Unit 2 Essentials of cyber security 2016 Suite Cambridge TECHNICALS LEVEL 2 IT Unit 2 Essentials of cyber security A/615/1352 Guided learning hours: 30 Version 1 September 2016 ocr.org.uk/it LEVEL 2 UNIT 2: Essentials of cyber security A/615/1352

More information

DOM ix Dimple key system.

DOM ix Dimple key system. DOM ix Dimple key system. I have read the article of Bob Dix with great interest. As a collector and specialist of European high security (pad)locks. I would like to delve deeper into the mechanics of

More information

High Security Roller Shutters. factories retail shops loading bays warehouses industrial units

High Security Roller Shutters. factories retail shops loading bays warehouses industrial units High Security Roller Shutters Where higher levels of security is a main concern, the LPS1175 approved Centurion Shutter resists attempts at forced entry from SR1 right up to SR4 to combat the most determined

More information

Invisible Hinges Page

Invisible Hinges Page Finish: Izerwaren Invisible Hinges Page -4-1-1 Seawater Resistant Satin nickel plated MINI INVISIBLE HINGES WITH STAINLESS STEEL PINS invisible hinge for minimum door thickness 1/2 Small Invisible Hinge

More information

Module: Authentication. Professor Trent Jaeger. CSE543 - Introduction to Computer and Network Security

Module: Authentication. Professor Trent Jaeger. CSE543 - Introduction to Computer and Network Security CSE543 - Introduction to Computer and Network Security Module: Authentication Professor Trent Jaeger 1 1 Authentication and Authorization Fundamental mechanisms to enforce security on a system Authentication:

More information

Sony Vaio VPCCW21FX System Board Removal

Sony Vaio VPCCW21FX System Board Removal Sony Vaio VPCCWFX System Board Removal General motherhood : Standard rules apply regarding static electricity discharge Keep track of screws that are removed by labeling each group and writing on the internal

More information

7, 8, 8.1, 10. You can still get windows ten upgrade from 7, 8 and 8.1 now. Just need the right file to upgrade, I have it.

7, 8, 8.1, 10. You can still get windows ten upgrade from 7, 8 and 8.1 now. Just need the right file to upgrade, I have it. 7, 8, 8.1, 10 This presentation is on windows 10. Most if not all procedures we will discuss today will work on all 4 versions of windows talk about today. Below is when support ends for each version.

More information

User Manual Black OnyX3

User Manual Black OnyX3 User Manual Black OnyX3-1 - Contents Safety Information 03 Specification 06 Connection 07 Accessories 08 Header and Base bar Assembly 09 Physical Connection 13 Control System 14 Service and Maintance 15

More information

EPX Touchscreen and Display Replacement Assemblies

EPX Touchscreen and Display Replacement Assemblies EPX Touchscreen and Display Replacement Assemblies This document describes the procedures required to replace the touchscreen and display assembly in the EPX BZK-08T7 kit. The following procedures are

More information

Making Security Agile

Making Security Agile Making Security Agile 2017 - INVITING SECURITY INTO DEVOPS SURVEY 1 CEOs are caught between a rock and a hard place. On one hand, there is tremendous pressure to digitally transform their companies. As

More information

Series Amp Quick Connect Input and Output Power Panels

Series Amp Quick Connect Input and Output Power Panels Series 300 1200-1600 Amp Quick Connect Input and Output Power Panels DANGER is used in this manual to warn of a hazard situation which, if not avoided, will result in death or serious injury. WARNING is

More information

Information System Security. Nguyen Ho Minh Duc, M.Sc

Information System Security. Nguyen Ho Minh Duc, M.Sc Information System Security Nguyen Ho Minh Duc, M.Sc Contact 2 Nguyen Ho Minh Duc Phone: 0935 662211 E-mail: duc.nhm@gmail.com Web:http://nhmduc.wordpress.com 3 Lecture 01 INTRODUCTION Topics 4 What information

More information

CLIQ CONNECT SECURE YOUR SITES IMPROVE EFFICIENCY REDUCE COSTS. It connects to your smartphone and updates access rights anytime, anywhere...

CLIQ CONNECT SECURE YOUR SITES IMPROVE EFFICIENCY REDUCE COSTS. It connects to your smartphone and updates access rights anytime, anywhere... It connects to your smartphone and updates access rights anytime, anywhere... What s new about this key? SECURE YOUR SITES IMPROVE EFFICIENCY REDUCE COSTS CLIQ CONNECT exclusively from ONE SOLUTION - UNLIMITED

More information

Village Software. Security Assessment Report

Village Software. Security Assessment Report Village Software Security Assessment Report Version 1.0 January 25, 2019 Prepared by Manuel Acevedo Helpful Village Security Assessment Report! 1 of! 11 Version 1.0 Table of Contents Executive Summary

More information

NTG8 Instruction Manual

NTG8 Instruction Manual NTG8 Instruction Manual www.rodemic.com (EMC, LVD) Introduction Thank you for your purchase of the RØDE NTG8 precision broadcast-grade shotgun microphone. Based on RØDE s award winning NTG3, the NTG8 is

More information

c Custom Work Kenstan V ABLOY E Medeco Core Electronic Prox New Product Manufacturer of Fine Showcase and Cabinet Locks L O C K C O M P A N Y

c Custom Work Kenstan V ABLOY E Medeco Core Electronic Prox New Product Manufacturer of Fine Showcase and Cabinet Locks L O C K C O M P A N Y Manufacturer of Fine Showcase and Cabinet Locks New Product Electronic Prox Lite E Medeco Core Electronic Accessories Disc Tumbler Pin Tumbler Keymatic S V ASSA I.C. Core ABLOY Custom Lock Design and Manufacturing

More information

HIPAA Assessment. Prepared For: ABC Medical Center Prepared By: Compliance Department

HIPAA Assessment. Prepared For: ABC Medical Center Prepared By: Compliance Department HIPAA Assessment Prepared For: ABC Medical Center Prepared By: Compliance Department Agenda Environment Assessment Overview Risk and Issue Score Next Steps Environment NETWORK ASSESSMENT (changes) Domain

More information