Oracle Vulnerability Scanning

Total Page:16

File Type:pdf, Size:1020Kb

Oracle Vulnerability Scanning BOOKS FOR PROFESSIONALS BY PROFESSIONALS® Wright RELATED Protecting Oracle Database 12c Protecting Oracle Database 12c helps you solve the problem of maximizing the safety, resilience, and security of an Oracle database whilst preserving performance, availability, and integration despite ongoing and new security issues in the software. The book demonstrates, through coded examples, how you can enable the consolidation features of Oracle Database 12c without increasing risk of either internal corruption or external vulnerability. In addition, new protections not publicly available are included, so that you can see how demonstrable risk improvements can be achieved, measured, and reported through Enterprise Manager 12c. Most importantly, the challenge of privileged access control within a consolidation environment is addressed, thus enabling a safe move to greater efficiency. You’ll learn about the following: • Oracle database security issues and how to defend against new risks and pre-existing architectural vulnerabilities, such as incoming DBlinks • Controlling and auditing the use of SYS privilege over a large estate using native tools • Using Oracle native audit as an IPS to block threats in real-time • Leveraging root segregation to secure Oracle DB • Securing privileged access control and break-glass sessions • Scaling automated security controls through Enterprise Manager to a large estate • Improving your ability to pass audits and stay compliant Shelve in ISBN 978-1-4302-6211-4 Databases/Oracle 55999 User level: Intermediate–Advanced SOURCE CODE ONLINE 9781430 262114 www.apress.com For your convenience Apress has placed some of the front matter material after the index. Please use the Bookmarks and Contents at a Glance links to access them. Contents at a Glance About the Author .............................................................................................................. xvii About the Technical Reviewer ........................................................................................... xix Acknowledgments ............................................................................................................. xxi Foreword ......................................................................................................................... xxiii ■ Part 1: Security Overview and History ......................................................... 1 ■ Chapter 1: Oracle Security History ....................................................................................3 ■ Chapter 2: Current State of the Art ....................................................................................7 ■ Chapter 3: Extrapolating Current Trends .........................................................................25 ■ Part 2: Defense Cookbook .......................................................................... 31 ■ Chapter 4: Managing Users in Oracle ..............................................................................33 ■ Chapter 5: Oracle Vulnerability Scanning ........................................................................43 ■ Chapter 6: Centralized Native Auditing and IPS ..............................................................55 ■ Chapter 7: Pluggable Database Primer ...........................................................................65 ■ Part 3: Security in the 12c Release ............................................................ 71 ■ Chapter 8: New Security Features in 12C ........................................................................73 ■ Chapter 9: Design Flaws, Fixed and Remaining in 12C ...................................................83 ■ Chapter 10: Security Issues in 12c ..................................................................................93 ■ Chapter 11: Advanced Defense and Forensic Response ................................................119 v ■ CONTENTS AT A GLANCE ■ Part 4: Security in Consolidation .............................................................. 143 ■ Chapter 12: Privileged Access Control Foundations .....................................................145 ■ Chapter 13: Privileged Access Control Methods ...........................................................151 ■ Chapter 14: Securing Privileged Access Control Systems ............................................163 ■ Chapter 15: Rootkit Checker and Security Monitoring ..................................................181 ■ Part 5: Architectural Risk Management ................................................... 205 ■ Chapter 16: Oracle Security Architecture Foundations .................................................207 ■ Chapter 17: Enterprise Manager 12C as a Security Tool ...............................................215 ■ Chapter 18: Defending Enterprise Manager 12C ...........................................................261 ■ Chapter 19: “The Cloud” and Privileged Access ............................................................287 ■ Chapter 20: Management and Conclusions ...................................................................297 Index .................................................................................................................................303 vi PART 1 Security Overview and History CHAPTER 1 Oracle Security History The notion of “Oracle Security” could be said to have started with Amun’s Temple at the Siwa Oasis in Egypt. The protection of the temple building was used to shield the knowledgeable priest or “Oracle,” as well as their symbolic power. This knowledge and power was so prized that in 331 BC Alexander the Great sought guidance from the Oracle before embarking on his tour of the East. This priority for physical security was shared by the first computer-based “Oracle” in the United States at Oak Ridge National Laboratory in 1951. ORACLE was the most powerful computer in the world but was only accessible by a single human user locally, thus electronic security was not yet the main concern. Figure 1-1. Single local user of ORACLE; Courtesy of Oak Ridge National Laboratory, U.S. Dept. of Energy 3 CHAPTER 1 ■ ORACLE SECURITY HISTORY The first multi-user computing machines, which arrived at MIT in 1962, began to raise security concerns by 1967, mainly regarding the protection of one user’s process from another, as described by Bernard Peters of the NSA. Peters’ paper was a seminal requirements document for much of what followed in computer security and is available at the following URL: http://bit.ly/16n1SZM Concurrently, at MIT a debate was raging. Richard Greenblatt disagreed with the need for stringent security controls in the new MIT multi-user OS, MULTICS (predecessor of UNIX). His team preferred a less controlled, more creative environment without incessant restrictions such as entering passwords. This point in time is credited as the start of “hacker” culture, later extended by Richard Stallman’s rejection of controls that limited users’ freedoms, and resulted in the founding of the GPL that protected those freedoms. There is still legitimate debate as to whether security measures that limit and hide information from users are as effective as other measures that introduce visibility and accountability to a system. Folks interested in full disclosure often refer to the famous quote by the American lock designer A.C. Hobbs, who believed safe designs should not be too secret: “It cannot be too earnestly urged that an acquaintance with real facts will, in the end, be better for all parties.” However, increased public network access to multi-user machines and requirements from military sponsors necessitated greater security and secrecy controls, which were implemented by SDC for the military in the ADEPT-50 system, as documented by Clark Weissman in 1969. You can read Weissman’s paper at the following URL: http://bit.ly/1436OvH These early security implementations later fed into the seminal Rainbow Series of books by MITRE, which laid the foundation for information security practice and can be read freely at this URL: http://www.fas.org/irp/nsa/rainbow.htm In the 1970s Larry Ellison read Dr. Edgar Codd’s IBM paper on relational databases and cleverly saw the potential for data integrity, disk space, and group membership inference. You can find Codd’s paper at: http://bit.ly/118hrj1 In 1978, Larry and colleagues at SDL worked on a CIA project looking to implement a relational database using SQL, namely Oracle Version 1. That effort is described by Scott Hollows in his presentation at: http://bit.ly/ZMC9Vc I am reliably informed by an Oracle employee that the original Oracle project actually started at the NSA, thus pre-dating the CIA reference above, which makes sense. Version 2 of Oracle was released in 1979 as the first commercially available SQL RDBMS, with the first customer being Wright-Patterson Air Base. Like ORNL’s ORACLE hardware in the previous photo, the Oracle relational database was restricted to local access until 1985, when version 5 introduced client/server. Version 6 brought PL/SQL in 1988, and 1992’s Version 7 introduced “Trusted Oracle,” a.k.a. Label Security. Oracle 8i in 1998 introduced Internet-related capabilities such as a JVM and Linux support. The popularization of Internet access in the late ’90s fueled an interest in computer security, similar to that already experienced at the OS level by Peters and Weissman. This again necessitated greater security controls. 4 CHAPTER 1 ■ ORACLE SECURITY HISTORY Therault and Heney’s book Oracle Security, published by O’Reilly Media
Recommended publications
  • Non -Destructive Entry Magazine
    #3#3 Non-Destructive Entry Magazine Medecoder ABUS Plus Ingersoll Tiger Team And More! MayMay FOR LOCKSPORT! 20082008 WelcomeWelcome For Locksport! I received a message the other night. It was Amanda, a friend of mine who has recently taken up lockpicking. She was complaining that the challenge lock I left at her house had pricked her with a metal splinter. I told her I was sorry, she simply replied: “I HAVE BLED FOR LOCKSPORT!” I have too actually, when I first tried to make my own picks. In fact, in an informal survey I found that 100% of NDE readers who were surveyed have bled for locksport. A staggering percentage! We give our blood to these locks and it’s worth remembering what they give to us. Locks provide us not just with physical safety, but with peace of mind. They are a staple of the civilized world. A lock says “someone owns this, it’s not for you.” It’s the dividing line between the public and the private. And for the lockpicker? A lock presents a chal- lenge, a never-ending supply of new puzzles and as our hobby grows. Fueled as every- thing is now, by the internet, we see more collaboration, faster progress and ever more clever solutions to the problems the locks pose. However, there are new challenges that we should have seen coming. Specifically, how to disclose this information. The trouble is, when we get excited at our discovery and bound off to tell as many people as we can, we are celebrating what a lock means for us, it’s been conquered, the puzzle solved, the code deciphered.
    [Show full text]
  • The Lock Collector from Tony Beck January/March 2006 Issue No
    The Lock Collector From Tony Beck January/March 2006 Issue No. 10 All Ri ghts Reserved. Copyright ©, R. A. Beck 2006. Editor’s Note: This issue extends the miserly single page biography of Edwin C otterill included in the last one! He stands highly amongst the greatest English lock inventors, particularly for his Climax Det ector lock patented in 1846. This issue contains Part 2: His Middle Age and Lock Inventions. The final Part 3 will follow next i ssue. Most of us will know of Willenhall Lock Museum’s demise and transformation to The Locksmith’s House. All this involved co nsiderable change when the Black Country Living Museum became the new owners in May 2003. Richard Hopkins, who helped them to de al with the complexities of cataloguing the Locks, Keys and Archive material, has kindly contributed an article setting out what was involved. I do hope it will be found interesting, and perhaps some questions will arise. Like - will an Inventory of all the locks, keys and archives be sometime available to view? Does the Museum intend to consult with lock collectors on what items are to be exhibited in the Locksmith’s House apart from those initially on show? Also what plans are there to introduce the Museum’s exhibits held in BCLM’s Dudley store to public view? It’s certainly sad to see the opportunity lost that might have seen finance being provided to expand and create a fine Museum dedicated to locks and keys; like there is in Austria, France, German y, Holland, U.S.A., etc.
    [Show full text]
  • The Spectacle of Security: Lock-Picking Competitions and the Security Industry in Mid-Victorian Britain
    This is a repository copy of The spectacle of security: lock-picking competitions and the security industry in mid-Victorian Britain. White Rose Research Online URL for this paper: http://eprints.whiterose.ac.uk/83078/ Version: Accepted Version Article: Churchill, D (2015) The spectacle of security: lock-picking competitions and the security industry in mid-Victorian Britain. History Workshop Journal, 80 (1). 52 - 74. ISSN 1363-3554 https://doi.org/10.1093/hwj/dbv018 Reuse Unless indicated otherwise, fulltext items are protected by copyright with all rights reserved. The copyright exception in section 29 of the Copyright, Designs and Patents Act 1988 allows the making of a single copy solely for the purpose of non-commercial research or private study within the limits of fair dealing. The publisher or other rights-holder may allow further reproduction and re-use of this version - refer to the White Rose Research Online record for this item. Where records identify the publisher as the copyright holder, users can verify any specific terms of use on the publisher’s website. Takedown If you consider content in White Rose Research Online to be in breach of UK law, please notify us by emailing [email protected] including the URL of the record and the reason for the withdrawal request. [email protected] https://eprints.whiterose.ac.uk/ Spectacles of Security: Lock-Picking Competitions and the Emergence of the British Security Industry in the Mid-Nineteenth Century David Churchill [This article is forthcoming in the History Workshop Journal.] Despite decades of research on the history of crime, policing and punishment, historical work on security remains in its infancy.
    [Show full text]
  • LSS+ MASTER EXHIBIT LISTING Page 1
    LSS+ MASTER EXHIBIT LISTING LOCKS, SAFES, AND SECURITY LSS+ Version 5.0 Electronic Infobase Version 5.0, based upon the Second Edition, published by Charles C. Thomas, Springfield Illinois, 2000. The original edition was published in 1970 and is no longer available. Table of Contents Chapter 1 The Lock: Four Thousand Years of Technology Chapter 2 The Last Twenty-Five Years Chapter 3 Definition of Terms Chapter 4 Tools and Supplies Chapter 5 Materials and Processes Chapter 6 The Development of Keys Chapter 7 Processes and Materials for Producing Blank Keys Chapter 8 Methods of Producing Cut Keys Chapter 9 Producing Keys for Specific Locks Chapter 10 High-Security Locks and Keys Chapter 11 Keying Systems Chapter 12 Basic Lock Configurations: Hardware Chapter 13 Warded Locks Chapter 14 The Lever Tumbler Lock Chapter 15 Wafer Locks Chapter 16 Pin Tumbler Locks Chapter 17 Traditional Mechanical Locking Systems Chapter 18 Electromechanical Locks Chapter 19 Magnetic Locks Chapter 20 Wireless Exchange of Code Information Chapter 21 Intelligent Keys and Locks Chapter 22 Programmable Locks and Keys Chapter 23 Specialized Industry Applications Chapter 24 Investigation and Evidence Involving Locks and Keys Chapter 25 Forensic Examination: Specifications, Operations, and Security Chapter 26 Forensic Examination: Tool Marks and Trace Evidence Chapter 27 Forensic Examination of Keys Chapter 28 General Introduction to Bypass Chapter 29 Picking Chapter 30 Impressioning Chapter 31 The Decoding of Locks: Theory, Procedures, and Technologies Chapter 32 Destructive
    [Show full text]
  • Bramah Security Equipment Limited
    BRAMAH SECURITY EQUIPMENT LIMITED Marylebone – London – Sales Office and Factory Outlet (LONDON WEST END) 31 Oldbury Place, London, England, W1U 5PT Telephone +44 (0)844 482 2034 Facsimile +44 (0)20 7935 2779 Email:[email protected] Web: www.bramah.co.uk Romford – Essex – Factory Shop and Manufacturing Site (LONDON EAST END) 19 Danes Road, Romford, Essex, RM7 0HL Telephone +44 (0)8080 027262 Facsimile +44 (0)1708 768825 Email:[email protected] Web: www.bramah.co.uk The Bramah lock mechanism is 227 years old this year. WORLD PRICE LIST From – 28th February 2011 Prices For Examples of the Most Popular Bramah Lock Sets 2-10 Bramah Lock Range (Mortice, Cylinder, Cabinet, Padlock, Safe) 11–15 Bramah Key and Combination Change Details 16 - 17 Bramah 22mm Profile Cylinder Range 18 – 22 Bramah Kaye Euro, Oval and 22mm Profile Range 23 – 25 Bramah Replacement Key Pricing Matrix 26 – 27 Bramah Component Pricing 28 Bramah Old Type Pricing 29 Rola Product Range 30 - 32 Hours of Business Marylebone – Sales Office and Trade Counter -Monday to Friday 8.30am to 5.30pm Saturday 9.00am to 1.00pm Romford – Factory Shop – Monday to Friday only 8.00am to 4.00pm Earlier or Saturday by arrangement. Handing Of Products Right=1 Left=2 Right=3 Left=4 Bramah Security Equipment Ltd - 31 Oldbury Place, London W1U 5PT BRAMAH PRODUCT RANGE - EXAMPLES OF THE MOST POPULAR LOCK SETS Retail Price List Not Including VAT From 28th February 2011 RRP £ BMA / Brass SCP PC Nickel Black RIM CYLINDERS FOR FRONT DOORS Option 1.1.71.IN - Rim Cylinder For Front Doors Stock Stock Stock Stock Order Deadbolt is automatically thrown when door closes and withdrawn by pull lever inside or key outside.
    [Show full text]
  • Picks and Tips from Mike the Locksmith
    From: Mike's Locksmith <[email protected]> Subject: There comes a time when autumn asks... Preheader: Because small things make a world of difference Reply: [email protected] Having trouble viewing this email? Click here It's always the little things that make a difference. Picks and Tips from Mike the Locksmith From the World of Mike- the-Locksmith ...What have you been doing all summer? (unknown) Cooler days and autumn are just around the corner. Me, I'm looking forward to the changing of leaves, walks in the forest with the family and the dogs and hot stew upon my return home. And, this quote never gets old for me: No one is useless in this world who lightens the burden of it to anyone else. - Charles Dickens As always, with every purchase from Mike's Locksmith, you are making a tremendous difference. Together, we can help others, less advantaged. B1G1 - Business for Good. Visit the website here. In this issue: "Meet Some Famous Locksmiths" and "Find a Great Agent". Be sure to read below about the charity that I've designated for the month of September. And, once again, many thanks for your business and your referrals. Mike-the-Locksmith KEYS4VEHICLES by Mike's Locksmith DON'T PAY DEALERSHIP PRICES! Duplicates, Replacements, Remotes, Spare Keys, Ask Us About Replacement Programming (for Most Models) Keys We Provide Prompt, Reliable Service, at a Fraction of Dealership Cost. Call Us for a Quote Today! 240-506-7500. Innovators in Locking Systems Meet Some Famous Locksmiths Throughout history, there have been several locksmiths that left their mark.
    [Show full text]
  • Catalogue of High Security Locks
    Catalogue of High SecurityLocks v1.00 Author: Graham Pulford Date: 27 April 1994 [email protected] Department of Electrical and Electronic Engineering, University of Melbourne, Australia. Notes and disclaimer: ? The author is a lo ckenthusiast, not a quali ed lo cksmith, so some of the terminology may b e incorrect. Furthermore, the author makes no claim as to the accuracy of the information presented in this do cument. ? This catalogue is meant only as a sample of some of the world's more interesting and unusual lo cks. ? The material re ects the author's taste and exp erience in lo cks and is not intended to favour one country's lo cks ab ove those of another. ? A list of car lo cks, magnetic lo cks, combination lo cks and electronic lo cks, together with some mystery lo cks has b een included at the end of the do cument. However, no op erational descrip- tions have b een provided for these lo cks. Please feel free to comment on these if you know how they work, so that they may b e included in future versions of the catalogue. ? Where several lo cks brands are considered to b e equivalent, these are listed together. Related lo cks are cross-referenced. ? A large numb er of safe lo cks typically Italian double-bitted lever lo cks have b een omitted. TM ? Some of the information for this list was obtained from the 1993 Silca 101 and 201 key catalogues, and from various manufacturers' bro chures. A large part was obtained through insp ection of the lo cks themselves.
    [Show full text]
  • High-Security Mechanical Locks : an Encyclopedic Reference/Graham W
    High-Security Mechanical Locks: An Encyclopedic Reference This page intentionally left blank High-Security Mechanical Locks: An Encyclopedic Reference Graham W. Pulford AMSTERDAM • BOSTON • HEIDELBERG • LONDON NEW YORK • OXFORD • PARIS • SAN DIEGO SAN FRANCISCO • SINGAPORE • SYDNEY • TOKYO Butterworth-Heinemann is an imprint of Elsevier Elsevier Academic Press 30 Corporate Drive, Suite 400, Burlington, MA 01803, USA 525 B Street, Suite 1900, San Diego, California 92101-4495, USA 84 Theobald’s Road, London WC1X 8RR, UK This book is printed on acid-free paper. Copyright c 2007, Elsevier Inc. All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Permissions may be sought directly from Elsevier’s Science & Technology Rights Department in Oxford, UK: phone: (+44) 1865 843830, fax: (+44) 1865 853333, E-mail: [email protected]. You may also complete your request on-line via the Elsevier homepage (http://elsevier.com), by selecting “Customer Support” and then “Obtaining Permissions.” Library of Congress Cataloging-in-Publication Data Pulford Graham W. High-security mechanical locks : an encyclopedic reference/Graham W. Pulford. p. cm. Includes bibliographical references and index. ISBN-13: 978-0-7506-8437-8 (alk. paper) ISBN-10: 0-7506-8437-2 (alk. paper) 1. Locks and keys–Encyclopedias. TS520.P854 2007 683.32–dc22 2007004202 British Library Cataloguing-in-Publication Data A catalogue record for this book is available from the British Library ISBN 13: 978-0-7506-8437-8 ISBN 10: 0-7506-8437-2 For all information on all Elsevier Academic Press publications visit our Web site at www.books.elsevier.com Printed in the United States of America 07080910111210987654321 To Jill, Arthur, Lehene, HweeYing and Chlo¨e This page intentionally left blank Contents Acknowledgments xi Preface xiii 1 Introduction 1 1.1 Prologue..........................................
    [Show full text]
  • High Security Locking Devices: a State-Of-The-Art Report
    High Security Locking Devices A State-of-the-Art Report 15 U S. DEPARTMENT OF COMMERCE National Bureau of Standards National Engineering Laboratory Center for Building Technology Environmental Design Research Division Washington, DC 20234 June 1981 Issued January 1 982 Prepared for: Civil Engineering Laboratory Naval Construction Battalion Center Port Hueneme, CA 93040 QC 100 .U56 NO. 81 -2233 1982 NBSIR 81-2233 HIGH SECURITY LOCKING DEVICES A STATE-OF-THE-ART REPORT John S. Stroik U.S. DEPARTMENT OF COMMERCE National Bureau of Standards National Engineering Laboratory Center for Building Technology Environmental Design Research Division Washington, DC 20234 June 1 981 Issued January 1982 This work was sponsored by the Defense Nuclear Agency, under Subtask Code B99QAXRB202, Work Unit Code 06. Prepared for: Civil Engineering Laboratory Naval Construction Battalion Center Port Hueneme, CA 93040 U.S. DEPARTMENT OF COMMERCE, Malcolm Baldrige, Secretary NATIONAL BUREAU OF STANDARDS. Ernest Ambler. Director Table of Contents Page Abstract v Preface vi Acknowledgments vi 1. INTRODUCTION 1 1.1 Background 2 1.2 Goals And Objectives 2 1.3 Scope 3 2. REVIEW OF LOCKING DEVICES 4 2.1 General Description of Locks 5 2.2 Types Of Locking Devices 8 2.3 Lock Functions 12 2.4 Lock Grades 14 3. LOCK CLASSIFICATION 20 4. INSTALLATION TYPES 25 4.1 Methods Of Installation 27 4.2 Application 31 4.3 Purpose 31 5. OPERATION TYPES 33 5.1 Keyed Mechanical Operation 35 5.1.1 Warded Locks 35 5.1.2 Cylinder Tumbler Locks 36 5.1.3 Lever Locks 44 5.1.4 Magnetic Locks 46 5.2 Keyless Mechanical Operation 47 5.2.1 Manual And Passive Bolt Locks 48 5.2.2 Wheel Tumbler Locks 49 5.2.3 Coded Cypher Locks 50 5.2.4 Time Locks 51 5.2.5 Exit Devices 52 5.3 Electromagnetic Operation 52 5.4 Electro-Mechanical Operation 53 5.4.1 Manually Encoded 54 5.4.2 Electronical ly Encoded 55 i i i Table of Contents (con't) 5.4.3 Page Personal Characteri si tcs Verification System 58 5.5 Other Systems 59 6.
    [Show full text]
  • Physical Security RS&RM Contents
    Physical Security RS&RM Contents 1 Security 1 1.1 Perceived security compared to real security ............................... 1 1.2 Categorizing security ........................................... 2 1.3 Security concepts ............................................. 2 1.4 Security at home .............................................. 2 1.5 Security management in organizations ................................... 2 1.6 See also .................................................. 3 1.7 References ................................................ 3 1.8 External links ............................................... 3 2 Physical security 4 2.1 Overview ................................................. 4 2.2 Elements and design ............................................ 4 2.2.1 Deterrence methods ....................................... 4 2.2.2 Intrusion detection and electronic surveillance .......................... 5 2.2.3 Access control .......................................... 6 2.2.4 Security personnel ........................................ 7 2.3 See also .................................................. 7 2.4 References ................................................. 7 3 Closed-circuit television 9 3.1 History .................................................. 9 3.1.1 Technology ............................................ 10 3.1.2 Application ............................................ 10 3.2 Uses .................................................... 10 3.2.1 Crime prevention ......................................... 10 3.2.2
    [Show full text]
  • Catalogue of High Security Locks V1.00
    Catalogue of High SecurityLocks v1.00 Author: Graham Pulford Date: 27 April 1994 [email protected] Department of Electrical and Electronic Engineering, University of Melbourne, Australia. Notes and disclaimer: ? The author is a lo ckenthusiast, not a quali ed lo cksmith, so some of the terminology may b e incorrect. Furthermore, the author makes no claim as to the accuracy of the information presented in this do cument. ? This catalogue is meant only as a sample of some of the world's more interesting and unusual lo cks. ? The material re ects the author's taste and exp erience in lo cks and is not intended to favour one country's lo cks ab ove those of another. ? A list of car lo cks, magnetic lo cks, combination lo cks and electronic lo cks, together with some mystery lo cks has b een included at the end of the do cument. However, no op erational descrip- tions have b een provided for these lo cks. Please feel free to comment on these if you know how they work, so that they may b e included in future versions of the catalogue. ? Where several lo cks brands are considered to b e equivalent, these are listed together. Related lo cks are cross-referenced. ? A large numb er of safe lo cks typically Italian double-bitted lever lo cks have b een omitted. TM ? Some of the information for this list was obtained from the 1993 Silca 101 and 201 key catalogues, and from various manufacturers' bro chures. A large part was obtained through insp ection of the lo cks themselves.
    [Show full text]
  • Bramah Security Equipment Limited
    BRAMAH SECURITY EQUIPMENT LIMITED Marylebone – London – Sales Office and Factory Outlet (LONDON WEST END) 31 Oldbury Place, London, England, W1U 5PT Telephone +44 (0)844 482 2034 Facsimile +44 (0)800 018 0283 Email:[email protected] Web: www.bramah.co.uk Romford – Essex – Factory Shop and Manufacturing Site (LONDON EAST END) 19 Danes Road, Romford, Essex, RM7 0HL Telephone +44 (0)8080 027262 Facsimile +44 (0)800 018 0284 Email:[email protected] Web: www.bramah.co.uk The Bramah lock mechanism is 228 years old this year. WORLD PRICE LIST From – 29th February 2012 Prices For Examples of the Most Popular Bramah Lock Sets 2 - 10 Bramah Lock Range (Mortice, Cylinder, Cabinet, Padlock, Safe) 11 – 15 Bramah Key and Combination Change Details 16 - 17 Bramah 22mm Profile Cylinder Range 18 – 22 Bramah Kaye Euro, Oval and 22mm Profile Range 23 – 25 Bramah Replacement Key Pricing Matrix 26 – 27 Bramah Component Pricing 28 Bramah Old Type Pricing 29 Rola Product Range 30 - 32 Hours of Business Marylebone – Sales Office and Trade Counter -Monday to Friday 8.30am to 5.30pm Saturday 9.00am to 1.00pm Romford – Factory Shop – Monday to Friday only 8.00am to 4.00pm Earlier or Saturday by arrangement. Handing Of Products Right=1 Left=2 Right=3 Left=4 Bramah Security Equipment Ltd - 31 Oldbury Place, London W1U 5PT BRAMAH PRODUCT RANGE - EXAMPLES OF THE MOST POPULAR LOCK SETS Retail Price List Not Including VAT From 29th February 2012 RRP £ BMA / Brass SCP PC Nickel Black RIM CYLINDERS FOR FRONT DOORS Option 1.1.71.IN - Rim Cylinder For Front Doors Stock Stock Stock Stock Order Deadbolt is automatically thrown when door closes and withdrawn by pull lever inside or key outside.
    [Show full text]