{"id":200121,"date":"2025-11-28T05:00:21","date_gmt":"2025-11-28T11:00:21","guid":{"rendered":"https:\/\/www.een.com\/?p=200121"},"modified":"2025-11-25T15:31:33","modified_gmt":"2025-11-25T21:31:33","slug":"louvre-lesson-security-is-a-complex-not-only-a-process","status":"publish","type":"post","link":"https:\/\/www.een.com\/de\/blog\/louvre-lesson-security-is-a-complex-not-only-a-process\/","title":{"rendered":"Louvre lesson: Security is a complex, not only a process"},"content":{"rendered":"\n<p>Last month&#8217;s news footage could have come from an over-the-top movie, with a stolen cherry picker brazenly on the street outside one of the most important museums in the world, and getaway scooters standing by to zip the thieves away. That the loot stolen last month at the Louvre was literally royal jewels made the plot even more familiar-sounding.<br><br>But in a movie, the thieves might have needed more complex plotting to evade a deeply layered security system to accomplish their theft.&nbsp;<\/p>\n\n\n\n<p>The truth is that the theft at the Louvre made the news because it was high-value and bold \u2014&nbsp;not because it required criminal genius to accomplish.&nbsp;<\/p>\n\n\n\n<p>It&#8217;s often said that security is &#8222;a process, not a product.&#8220; Another aspect this crime highlights is that the actions that make up the security process themselves rely on numerous interconnected parts; the weakness of individual elements reduces the effectiveness of the others. In other words, it&#8217;s a complex.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The password (was) Louvre<\/h2>\n\n\n\n<p>The museum faced, and faces, limitations of the kind that every business or other institution does: Limitations in time, budget, and practicality mean that security always competes with other concerns, including comfort, aesthetics, and usability. A perfectly locked-down museum would be one where visitors couldn&#8217;t even be admitted, and wouldn&#8217;t want to visit anyhow.&nbsp;<\/p>\n\n\n\n<p>In the case of the Louvre, though, video coverage which might have deterred this crime in the first place or led to an even faster resolution, was notably absent in two places critical to the thieves&#8216; plan:&nbsp;&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list standard-ul\">\n<li>The museum&#8217;s Apollo Gallery had no cameras on the balcony where the thieves entered, which made the brute-force approach of an electric lift a practical attack.<\/li>\n\n\n\n<li>Despite a concerted effort since 2019 to put more cameras in place, a significant percentage of the museum&#8217;s galleries (more than 60%) lacked video coverage.\u00a0<\/li>\n<\/ul>\n\n\n\n<p>But even if cameras had been in place, a further weakness has now been widely reported: The museum&#8217;s central electronic security system was protected by a password easy enough for a movie villain to simply guess in a short time. Difficult as it is to believe, <a href=\"https:\/\/nypost.com\/2025\/11\/05\/world-news\/the-louvre-used-mind-blowingly-weak-password-for-core-security-system-ahead-of-102m-heist-report\/\" target=\"_blank\" rel=\"noopener\" title=\"\">that password was &#8222;LOUVRE.&#8220;\u00a0<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Plenty of stones, and lots of glass houses<\/h2>\n\n\n\n<p>If you consider how such things come to be, though, maybe it&#8217;s not at all hard to believe. You&#8217;ve probably experienced that complicated security procedures are costly and sometimes frustrating. It also takes time to train people to use any system, and instituting new passwords or procedures always takes longer than you&#8217;d think. Initial passwords may be selected for convenience, and there are lots of plausible reasons that weak passwords exist in the first place \u2014 or why they stick around.<br><br>&#8211; &#8222;We&#8217;ll change this soon, when we&#8217;ve completed this upgrade.&#8220;<br>&#8211; &#8222;Let&#8217;s issue a revised password, but only when the rest of the team is back from vacation.&#8220;<br>&#8211; &#8222;This password doesn&#8217;t matter much, because further steps are needed to get into individual parts of the system.&#8220;<br>&#8211; &#8222;We&#8217;re about to institute a new password manager anyhow.&#8220;<br>&#8211; &#8222;We need a password that doesn&#8217;t lock us out on the third attempt again.&#8220;<\/p>\n\n\n\n<div class=\"wp-block-media-text is-stacked-on-mobile een-text-media-block-left\" style=\"margin-bottom:var(--wp--preset--spacing--60);grid-template-columns:30% auto\"><figure class=\"wp-block-media-text__media\"><img fetchpriority=\"high\" decoding=\"async\" width=\"700\" height=\"648\" src=\"https:\/\/www.een.com\/wp-content\/uploads\/2025\/11\/louvre-blog-1.jpg\" alt=\"\" class=\"wp-image-200133 size-full\" srcset=\"https:\/\/www.een.com\/wp-content\/uploads\/2025\/11\/louvre-blog-1.jpg 700w, https:\/\/www.een.com\/wp-content\/uploads\/2025\/11\/louvre-blog-1-300x278.jpg 300w\" sizes=\"(max-width: 700px) 100vw, 700px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<p>Real-world security systems have to anticipate and build around the reality of complexity and imperfections. These imperfections may sound simple, but that doesn&#8217;t mean they&#8217;re easy to fix. No matter how many times it&#8217;s discouraged, employees <em>will<\/em> sometimes hold doors open for others (who may or may not be authorized). A password, or at least a password reminder, might be taped to the keyboard of a critical system. An often-needed panel may have its latch taped for easy access.<\/p>\n<\/div><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Just complicated enough<\/h2>\n\n\n\n<p>One important way to build around these easy-to-predict flaws is simply to require multiple means of authentication, so a password by itself is never enough to access a critical system. Hence, the popularity of physical security keys or ID badges, or the requirement that more than one person be present for certain high-security processes. (That taped-open panel may even be reasonable, if the surrounding processes and safeguards are adequate.)\u00a0<\/p>\n\n\n\n<p>Or, when it makes sense, to use built-in encryption, and devices that automatically establish one-way connections between devices. Even a highly technical thief following the classic thriller-film tactic of intercepting a security camera&#8217;s feed \u2014 and replacing it with innocuous content while a crime or covert entry takes place \u2014&nbsp;would simply be frustrated if that stream is encrypted, and if it took a ping from the camera to establish a connection at all.&nbsp;<\/p>\n\n\n\n<div class=\"wp-block-media-text has-media-on-the-right is-stacked-on-mobile een-text-media-block-left\" style=\"margin-bottom:var(--wp--preset--spacing--60);grid-template-columns:auto 30%\"><div class=\"wp-block-media-text__content\">\n<p>Tapping into camera feeds like this is a staple of fiction, but it&#8217;s not feasible with systems like <a href=\"https:\/\/www.een.com\/product\/cloud-vms-system-overview\/\">Eagle Eye Cloud VMS<\/a>. Even having a system-wide password isn&#8217;t enough, because that&#8217;s not the level at which the encryption takes place.<\/p>\n<\/div><figure class=\"wp-block-media-text__media\"><img decoding=\"async\" width=\"700\" height=\"525\" src=\"https:\/\/www.een.com\/wp-content\/uploads\/2025\/11\/louvre-blog-2.jpg\" alt=\"\" class=\"wp-image-200122 size-full\" srcset=\"https:\/\/www.een.com\/wp-content\/uploads\/2025\/11\/louvre-blog-2.jpg 700w, https:\/\/www.een.com\/wp-content\/uploads\/2025\/11\/louvre-blog-2-300x225.jpg 300w\" sizes=\"(max-width: 700px) 100vw, 700px\" \/><\/figure><\/div>\n\n\n\n<p>Most organizations aren&#8217;t protecting historic jewels \u2013 but they do need to protect people and property, whether that means stewarding lives in a school, or minding hundreds of customers&#8216; cars in an overnight parking lot. Getting the security complex right isn&#8217;t easy, if you&#8217;re doing it yourself. That&#8217;s reason enough to take advantage of experts who&#8217;ve done it before \u2014 and learned from lessons like the Louvre&#8217;s.&nbsp;<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"#post-contact-form\"> Let\u2019s talk<\/a><\/div>\n<\/div>\n\n\n\n\n","protected":false},"excerpt":{"rendered":"<p>Last month&#8217;s news footage could have come from an over-the-top movie, with a stolen cherry picker brazenly on the street outside one of the most important museums in the world, &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"\" href=\"https:\/\/www.een.com\/de\/blog\/louvre-lesson-security-is-a-complex-not-only-a-process\/\"> <span class=\"screen-reader-text\">Louvre lesson: Security is a complex, not only a process<\/span> Weiterlesen &raquo;<\/a><\/p>\n","protected":false},"author":3197,"featured_media":200144,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"4139,4147,4823,4827,4829,4831","_relevanssi_noindex_reason":"","footnotes":""},"categories":[2126],"tags":[],"class_list":["post-200121","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.een.com\/de\/wp-json\/wp\/v2\/posts\/200121","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.een.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.een.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.een.com\/de\/wp-json\/wp\/v2\/users\/3197"}],"replies":[{"embeddable":true,"href":"https:\/\/www.een.com\/de\/wp-json\/wp\/v2\/comments?post=200121"}],"version-history":[{"count":0,"href":"https:\/\/www.een.com\/de\/wp-json\/wp\/v2\/posts\/200121\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.een.com\/de\/wp-json\/wp\/v2\/media\/200144"}],"wp:attachment":[{"href":"https:\/\/www.een.com\/de\/wp-json\/wp\/v2\/media?parent=200121"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.een.com\/de\/wp-json\/wp\/v2\/categories?post=200121"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.een.com\/de\/wp-json\/wp\/v2\/tags?post=200121"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}