Physical access
Lock bumping:
see next slides.Don't rely solely on locks: use two-factor authentication
PIN keypad
Fingerprint
Security guard
Cloning access cards:
not so easy.
Magstripe
vs
RFID
cards
Open
RFID reader
, and
a RFID
hack reader and writer
.
Previous slide
Next slide
Back to first slide
View graphic version