Smart Megalopolises. How Safe and Reliable Is Your Data?

Size: px
Start display at page:

Download "Smart Megalopolises. How Safe and Reliable Is Your Data?"

Transcription

1 SESSION ID: TECH-T09 Smart Megalopolises. How Safe and Reliable Is Your Data? Denis Legezo Global Research and Analytics Team, Kaspersky SAC

2 Megalopolises are changing fast 2

3 The plan for today Smart cities: Sensors' role Reconnaissance: Vendors, locations, etc. Sensors' functionality: Interfaces and data Firmware: The Holy Grail of embedded Automation: Let's send some bytes Smart cities: Outside sensors 3

4 Why cities need all this stuff? Smart cities: Sensors' role Reconnaissance: Vendors, locations, etc. Sensors' functionality: Interfaces and data Firmware: The Holy Grail of embedded Automation: Let's send some bytes Smart cities: Outside sensors 4

5 Why do cities have be smart? Investments Staff Infrastructure Data centers Operation center 5

6 Raw data for planning 6

7 And for traffic management Possible to use for the traffic lights Counting vehicles number and change timings Counting pedestrians as well 7

8 Radars are the source of such data 8

9 The first phase Smart cities: Sensors' role Reconnaissance: Vendors, locations, etc. Sensors' functionality: Interfaces and data Firmware: The Holy Grail of embedded Automation: Let's send some bytes Smart cities: Outside sensors 9

10 Appearance is a great help 10

11 ..Any IDs you can get are also MACs Names Any IDs 11

12 What we are gathering? Smart cities: Sensors' role Reconnaissance: Vendors, locations, etc. Sensors' functionality: Interfaces and data Firmware: The Holy Grail of embedded Automation: Let's send some bytes Smart cities: Outside sensors 12

13 Look, interfaces 13

14 And a lots of data on-board 14

15 What's inside the data? Vehicle type Number of vehicles Median speed Station occupancy 15

16 The Holy Grail Smart cities: Sensors' role Reconnaissance: Vendors, locations, etc. Sensors' functionality: Interfaces and data Firmware: The Holy Grail of embedded Automation: Let's send some bytes Smart cities: Outside sensors 16

17 Can we add some functions? Through interface Debugger? Commands? What is format? 17

18 Format looks like ihex or SREC 18

19 But for which controller is it? 19

20 LinkedIn isn't only for HR 20

21 ..but it happens anyway For me in a blackbox mode it looks like dead end But does it means dead end at all? Of course not! 21

22 Even with the stock firmware.. Smart cities: Sensors' role Reconnaissance: Vendors, locations, etc. Sensors' functionality: Interfaces and data Firmware: The Holy Grail of embedded Automation: Let's send some bytes Smart cities: Outside sensors 22

23 Reconnaissance first I started with script + C Bluetooth tools adb to get GPS from phone C code for sending What to send? 23

24 Commands are partly known 24

25 So we can automate 25

26 Sensor will answer 26

27 What about the small DDoS? Driving by, changing settings Time: all traffic at night Types: all traffic trucks 27

28 Python + PostgreSQL seems better 28

29 Resolve vendor and address offline 29

30 What to do further and else? Smart cities: Sensors' role Reconnaissance: Vendors, locations, etc. Sensors' functionality: Interfaces and data Firmware: The Holy Grail of embedded Automation: Let's send some bytes Smart cities: Outside sensors 30

31 Side effects Gather Wi-Fi data and filter it with Postgres views MACs can be anonymous WEP is still alive 31

32 Where is always place for fuzzing Where are undocumented commands 32

33 So much other stuff 33

34 ...even speeding penalties Smart cities security perimeter if huge So is the surface of attacks Different authorities are in charge of the infrastructure 34

35 ...And tools 35

36 What to apply? Change appearance and default names Don't rely only on standard authentication Cooperate with third-party researches Think a little bit like malefactor or hire someone who can I know embedded devices vendors with generous bug bounty program. Respect Cities also could participate 36

37 Summary Smart city infrastructure is visible due to ID Kudos to vendor, firmware is strong Automation is possible with change of any settings Interesting side effects with wireless protocols Go further! 37

38 Denis Legezo

LIGHTING & INVESTMENT: SMARTLY CONNECTED

LIGHTING & INVESTMENT: SMARTLY CONNECTED LIGHTING & INVESTMENT: SMARTLY CONNECTED A smart city is. a city or group of cities that use innovative information technologies and the involvement of its inhabitants to sustainably develop its built

More information

A SMART PORT CITY IN THE INTERNET OF EVERYTHING (IOE) ERA VERNON THAVER, CTO, CISCO SYSTEMS SOUTH AFRICA

A SMART PORT CITY IN THE INTERNET OF EVERYTHING (IOE) ERA VERNON THAVER, CTO, CISCO SYSTEMS SOUTH AFRICA A SMART PORT CITY IN THE INTERNET OF EVERYTHING (IOE) ERA VERNON THAVER, CTO, CISCO SYSTEMS SOUTH AFRICA Who is Cisco? Convergence of Mobile, Social, Cloud, and Data Is Driving Digital Disruption Digital

More information

The modern car has 100 million lines of code and over half of new vehicles will be connected by 2020.

The modern car has 100 million lines of code and over half of new vehicles will be connected by 2020. Automotive The modern car has 100 million lines of code and over half of new vehicles will be connected by 2020. Cars are becoming increasingly connected through a range of wireless networks The increased

More information

Future Challenges and Changes in Industrial Cybersecurity. Sid Snitkin VP Cybersecurity Services ARC Advisory Group

Future Challenges and Changes in Industrial Cybersecurity. Sid Snitkin VP Cybersecurity Services ARC Advisory Group Future Challenges and Changes in Industrial Cybersecurity Sid Snitkin VP Cybersecurity Services ARC Advisory Group Srsnitkin@ARCweb.com Agenda Industrial Cybersecurity Today Scope, Assumptions and Strategies

More information

EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led

EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led Certification: Certified Network Defender Exam: 312-38 Course Description This course is a vendor-neutral, hands-on,

More information

Wireless Attacks and Countermeasures

Wireless Attacks and Countermeasures Wireless Attacks and Countermeasures Wireless Network Technology Wireless network refers to any type of computer network which is wireless, and is commonly associated with a network whose interconnections

More information

ABOUT SWISSTRAFFIC TABLE OF CONTENTS

ABOUT SWISSTRAFFIC TABLE OF CONTENTS Document Date: February 2017 Document Version: 2.3 SWISSTRAFFIC 2017 ABOUT SWISSTRAFFIC SWISSTRAFFIC is a planning and consulting firm operating internationally in the fields of mobility, road safety and

More information

01/02/2014 SECURITY ASSESSMENT METHODOLOGIES SENSEPOST 2014 ALL RIGHTS RESERVED

01/02/2014 SECURITY ASSESSMENT METHODOLOGIES SENSEPOST 2014 ALL RIGHTS RESERVED 01/02/2014 SECURITY ASSESSMENT METHODOLOGIES SENSEPOST 2014 ALL RIGHTS RESERVED Contents 1. Introduction 3 2. Security Testing Methodologies 3 2.1 Internet Footprint Assessment 4 2.2 Infrastructure Assessments

More information

Future Implications for the Vehicle When Considering the Internet of Things (IoT)

Future Implications for the Vehicle When Considering the Internet of Things (IoT) Future Implications for the Vehicle When Considering the Internet of Things (IoT) FTF-AUT-F0082 Richard Soja Automotive MCU Systems Engineer A P R. 2 0 1 4 TM External Use Agenda Overview of Existing Automotive

More information

Chapter 16: Advanced Security

Chapter 16: Advanced Security : Advanced Security IT Essentials: PC Hardware and Software v4.0 1 Purpose of this Presentation To provide to instructors an overview of : List of chapter objectives Overview of the chapter contents, including

More information

Expected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy

Expected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy CHAPTER 9 DEVELOPING NETWORK SECURITY STRATEGIES Expected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy Network Security Design

More information

Smart Cities Real Opportunity or Marketing Hype? Aaron Hesse, PE, RCDD Infrastructure Engineer Avista Utilities

Smart Cities Real Opportunity or Marketing Hype? Aaron Hesse, PE, RCDD Infrastructure Engineer Avista Utilities Smart Cities Real Opportunity or Marketing Hype? Aaron Hesse, PE, RCDD Infrastructure Engineer Avista Utilities Driving Forces The Smart City Concept Components of a Smart City Smart City Infrastructure

More information

LEARN. Here is a simple step by step to get the most out of inssider:

LEARN. Here is a simple step by step to get the most out of inssider: Thank you for downloading inssider by MetaGeek. With inssider, MetaGeek's wireless network scanner, you'll be able to improve your Wi-Fi performance by performing a quick survey that helps you choose the

More information

Securing Wireless LANs with Certificate Services

Securing Wireless LANs with Certificate Services 1 Securing Wireless LANs with Certificate Services PHILIP HUYNH University of Colorado at Colorado Springs Abstract Wireless Local Access Network (WLAN) is used popularly in almost everywhere from the

More information

Case Studies, Lessons Learned. Ing. Tijl Deneut Lecturer Applied Computer Sciences Howest Researcher XiaK, Ghent University

Case Studies, Lessons Learned. Ing. Tijl Deneut Lecturer Applied Computer Sciences Howest Researcher XiaK, Ghent University Case Studies, Lessons Learned Ing. Tijl Deneut Lecturer Applied Computer Sciences Howest Researcher XiaK, Ghent University Case Study Overview 3 different types of cases Troubleshooting We have systems

More information

IT Security Mandatory Solutions. Andris Soroka 2nd of July, RIGA

IT Security Mandatory Solutions. Andris Soroka 2nd of July, RIGA IT Security Mandatory Solutions Andris Soroka 2nd of July, 2014 @LPS, RIGA Data Security Solutions business card Specialization IT Security IT Security services (consulting, audit, pen-testing, market

More information

Capability Analysis of Internet of Things (IoT) Devices in Botnets & Implications for Cyber Security Risk Assessment Processes (Part One)

Capability Analysis of Internet of Things (IoT) Devices in Botnets & Implications for Cyber Security Risk Assessment Processes (Part One) Capability Analysis of Internet of Things (IoT) Devices in Botnets & Implications for Cyber Security Risk Assessment Processes (Part One) Presented by: Andrew Schmitt Theresa Chasar Mangaya Sivagnanam

More information

ITCertMaster. Safe, simple and fast. 100% Pass guarantee! IT Certification Guaranteed, The Easy Way!

ITCertMaster.   Safe, simple and fast. 100% Pass guarantee! IT Certification Guaranteed, The Easy Way! ITCertMaster Safe, simple and fast. 100% Pass guarantee! http://www.itcertmaster.com Exam : 350-050 Title : CCIE Wireless Exam (V2.0) Vendor : Cisco Version : DEMO Get Latest & Valid 350-050 Exam's Question

More information

How to Save the Smart Home from Cyber Invasion. IoT DevCon 2017 Art Swift, President, prpl Foundation

How to Save the Smart Home from Cyber Invasion. IoT DevCon 2017 Art Swift, President, prpl Foundation How to Save the Smart Home from Cyber Invasion Art Swift, President, prpl Foundation Smart Home Security Report 2016 Research Findings Smart device adoption has reached a tipping point - the smart home

More information

Troubleshooting Microsoft Windows XP-based Wireless Networks in the Small Office or Home Office

Troubleshooting Microsoft Windows XP-based Wireless Networks in the Small Office or Home Office Operating System Troubleshooting Microsoft Windows XP-based Wireless Networks in the Small Office or Home Office Microsoft Corporation Published: December 2004 Update: May 2005 Abstract Because small office/home

More information

GETTING THE MOST OUT OF EVIL TWIN

GETTING THE MOST OUT OF EVIL TWIN GETTING THE MOST OUT OF EVIL TWIN B-SIDES ATHENS 2016 GEORGE CHATZISOFRONIOU (@_sophron) sophron@census-labs.com www.census-labs.com > WHOAMI Security Engineer at CENSUS S.A. Cryptography, Wi-Fi hacking,

More information

Protecting Smart Buildings

Protecting Smart Buildings Protecting Smart Buildings The next frontier of critical infrastructure security Suzanne Rijnbergen - MBA visibility detection control Who am I? Global Director Professional Services @SecurityMatters (ForeScout)

More information

Wednesday, May 16, 2018

Wednesday, May 16, 2018 Wednesday, May 16, 2018 8:00 AM - 5:00 PM Wi Fi/WLAN Fundamentals Training by Tessco; Day Two of a Two Day Training. (Attendees must bring laptop computers for this training. Attendees should bring available

More information

How many controllers can I manage on a single AirLink network? One or more site controllers can manage up to 1,000 devices per AirLink system.

How many controllers can I manage on a single AirLink network? One or more site controllers can manage up to 1,000 devices per AirLink system. AirLink Frequently Asked Questions Commissioning How many controllers can I manage on a single AirLink network? One or more site controllers can manage up to 1,000 devices per AirLink system. What is the

More information

Wireless Networks. Lecture 4: Wireless Networking Devices. Assistant Teacher Samraa Adnan Al-Asadi 1

Wireless Networks. Lecture 4: Wireless Networking Devices. Assistant Teacher Samraa Adnan Al-Asadi 1 Wireless Networks Lecture 4: Wireless Networking Devices Assistant Teacher Samraa Adnan Al-Asadi 1 Contents wireless LAN adapter cards wireless access Points wireless bridges wireless routers Assistant

More information

Frequently Asked Questions

Frequently Asked Questions General Where can I find a user guide? When logged in, a user guide can be downloaded from within the client. Help is located in the options tab at the bottom right hand corner of the desktop client and

More information

Outline : Wireless Networks Lecture 10: Management. Management and Control Services : Infrastructure Reminder.

Outline : Wireless Networks Lecture 10: Management. Management and Control Services : Infrastructure Reminder. Outline 18-759: Wireless Networks Lecture 10: 802.11 Management Peter Steenkiste Departments of Computer Science and Electrical and Computer Engineering Spring Semester 2016 http://www.cs.cmu.edu/~prs/wirelesss16/

More information

Automotive Cybersecurity: Why is it so Difficult? Steven W. Dellenback, Ph.D. Vice President R&D Intelligent Systems Division

Automotive Cybersecurity: Why is it so Difficult? Steven W. Dellenback, Ph.D. Vice President R&D Intelligent Systems Division Automotive Cybersecurity: Why is it so Difficult? Steven W. Dellenback, Ph.D. Vice President R&D Intelligent Systems Division Cybersecurity is not one Entry Point Four Major Aspects of Cybersecurity How

More information

SAFE AND EFFICIENT FLEET MANAGEMENT

SAFE AND EFFICIENT FLEET MANAGEMENT SAFE AND EFFICIENT FLEET MANAGEMENT LINDE CONNECT We make your fleet intelligent Our software and hardware connect your vehicles and deliver comprehensive information, allowing you to make efficient use

More information

5 Tips to Fortify your Wireless Network

5 Tips to Fortify your Wireless Network Article ID: 5035 5 Tips to Fortify your Wireless Network Objective Although Wi-Fi networks are convenient for you and your employees, there may be unwanted clients using up the bandwidth you pay for. In

More information

Duo Travel Guide. duo.com

Duo Travel Guide. duo.com Duo Travel Guide duo.com Overview As a member of an organization protected by Duo, you already have secure access to applications and assets. This guide is designed to help you maintain that trusted access

More information

SECURE HOME GATEWAY PROJECT

SECURE HOME GATEWAY PROJECT SECURE HOME GATEWAY PROJECT ICANN63 BARCELONA OCTOBER 22, 2018 Jacques Latour, CTO, CIRA Labs Canadian Internet Registration Authority Jacques.Latour [@] cira.ca Today's home network and IoT products and

More information

SACM Information Model Based on TNC Standards. Lisa Lorenzin & Steve Venema

SACM Information Model Based on TNC Standards. Lisa Lorenzin & Steve Venema SACM Information Model Based on TNC Standards Lisa Lorenzin & Steve Venema Agenda Security Automation with TNC IF-MAP SACM Information Model Based on TNC Standards Graph Model Components Operations SACM

More information

9 STEPS FOR FIGHTING AGAINST DDOS ATTACKS IN REAL-TIME.

9 STEPS FOR FIGHTING AGAINST DDOS ATTACKS IN REAL-TIME. 9 STEPS FOR FIGHTING AGAINST DDOS ATTACKS IN REAL-TIME www.haltdos.com info@haltdos.com Slow network performance or a single website downtime can cause serious revenue damage to any online business, both

More information

ArcSight Activate Framework

ArcSight Activate Framework ArcSight Activate Framework Petropoulos #HPProtect 44% Have trouble managing their SIEM eiqnetworks 2013 SIEM Survey #1 challenge Identification of key events SANS 2012 Log Management and Event Management

More information

Cloud Video Conferencing. A comprehensive guide

Cloud Video Conferencing. A comprehensive guide A comprehensive guide Reference Paper June 2014 How we communicate in the business world is changing. Businesses increasingly have more remote workers. Whether working remote fulltime, part-time or just

More information

White Paper. Why IDS Can t Adequately Protect Your IoT Devices

White Paper. Why IDS Can t Adequately Protect Your IoT Devices White Paper Why IDS Can t Adequately Protect Your IoT Devices Introduction As a key component in information technology security, Intrusion Detection Systems (IDS) monitor networks for suspicious activity

More information

CASE STUDIES TACTICAL ADVICE RESOURCES Infrastructure Optimization Security Storage Networking Mobile & Wireless Hardware & Software Management CURRENT ISSUE Subscribe 1/8 5 Next Level Data Consolidation

More information

User Guide. 450Mbps/300Mbps Wireless N Access Point TL-WA901ND/TL-WA801ND REV

User Guide. 450Mbps/300Mbps Wireless N Access Point TL-WA901ND/TL-WA801ND REV User Guide 450Mbps/300Mbps Wireless N Access Point TL-WA901ND/TL-WA801ND REV4.0.0 1910011930 Contents About This Guide...1 Chapter 1. Get to Know About Your Access Point.................... 2 1. 1. Product

More information

Good practice: Development of a Mobility Monitoring Centre (MMC) for Thessaloniki

Good practice: Development of a Mobility Monitoring Centre (MMC) for Thessaloniki Integrated REgional Action Plan For Innovative, Sustainable and LOw CaRbon Mobility Good practice: Development of a Mobility Monitoring Centre (MMC) for Thessaloniki The MMC of Thessaloniki objective The

More information

Wireless Networking. Chapter The McGraw-Hill Companies, Inc. All rights reserved

Wireless Networking. Chapter The McGraw-Hill Companies, Inc. All rights reserved Wireless Networking Chapter 23 Overview In this chapter, you will learn how to Discuss wireless networking components Analyze and explain wireless networking standards Install and configure wireless networks

More information

Enabling the Optimal End User Thin Client Experience

Enabling the Optimal End User Thin Client Experience Enabling the Optimal End User Thin Client Experience The Advantage of Choosing Windows-Based Thin Clients Over Linux-Based Alternatives W H I T E P A P E R INTRODUCTION More often than not, when considering

More information

NFC Identity and Access Control

NFC Identity and Access Control NFC Identity and Access Control Peter Cattaneo Vice President, Business Development Agenda Basics NFC User Interactions Architecture (F)ICAM Physical Access Logical Access Future Evolution 2 NFC Identity

More information

Borderless security engineered for your elastic hybrid cloud. Kaspersky Hybrid Cloud Security. #truecybersecurity

Borderless security engineered for your elastic hybrid cloud. Kaspersky Hybrid Cloud Security.  #truecybersecurity Borderless security engineered for your elastic hybrid cloud Kaspersky Hybrid Cloud Security www.kaspersky.com #truecybersecurity Borderless security engineered for your hybrid cloud environment Data

More information

How to Configure Wireless Internet Access (Wi-Fi) Advanced Settings on the Qwest Standard Modem: Actiontec GT701-WG

How to Configure Wireless Internet Access (Wi-Fi) Advanced Settings on the Qwest Standard Modem: Actiontec GT701-WG How to Configure Wireless Internet Access (Wi-Fi) Advanced Settings on the Qwest Standard Modem: Actiontec GT701-WG Internet Service Provider (ISP): All Use this document if: You need to configure the

More information

Attacking and Defending LoRa systems. LoRa the Explorer 22/03/2016

Attacking and Defending LoRa systems. LoRa the Explorer 22/03/2016 Attacking and Defending LoRa systems LoRa the Explorer 22/03/2016 LoRa the Explorer 1.What is LoRa / LoRaWAN? 2.LoRaWAN Security Features 3.How to test LoRa systems Introduction Introductions Introduction

More information

With Aruba Central, you get anywhere-anytime access to ensure that your network is up and performing efficiently.

With Aruba Central, you get anywhere-anytime access to ensure that your network is up and performing efficiently. Product overview Aruba Central, a cloud platform for managing Aruba Instant wireless LANs and Aruba Mobility Access Switches, offers IT organizations a simple and effective way to manage and monitor their

More information

Critical networking using mesh Wi-SUN technology Dr Simon Dunkley

Critical networking using mesh Wi-SUN technology Dr Simon Dunkley Critical networking using mesh Wi-SUN technology Dr Simon Dunkley 1 Content Critical infrastructure requirements Wi-SUN Mesh architecture Wi-SUN technology Case studies 2 Critical infrastructure requirements

More information

Instructions On How To Use Nokia Lumia 710 Bluetooth Files >>>CLICK HERE<<<

Instructions On How To Use Nokia Lumia 710 Bluetooth Files >>>CLICK HERE<<< Instructions On How To Use Nokia Lumia 710 Bluetooth Files Select Copy content to Nokia Lumia, and follow the instructions shown on your computer. Your the files straight to the OneDrive folder for automatic

More information

Step-by-Step: Handling RF Interference Challenges

Step-by-Step: Handling RF Interference Challenges WHITE PAPER Step-by-Step: Handling RF Interference Challenges TABLE OF CONTENTS» Introduction» STEP ONE: Identify non-wi-fi interferers» STEP TWO: Locate non-wi-fi interferers» STEP THREE: Identify Wi-Fi

More information

SGS CYBER SECURITY GROWTH OPPORTUNITIES

SGS CYBER SECURITY GROWTH OPPORTUNITIES SGS CYBER SECURITY GROWTH OPPORTUNITIES Eric Krzyzosiak GENERAL MANAGER DIGITAL Jeffrey Mc Donald Executive Vice President CERTIFICATION & BUSINESS ENHANCEMENT Eric Lee WIRELESS & CONSUMER RETAIL CYBER

More information

Electrification of Mobility

Electrification of Mobility Electrification of Mobility Moderator: Andreas Schafer, Cambridge University and Stanford University Panelists: Mary Nickerson, Toyota Ed Kjaer, Southern California Edition Flavio Bonomi, Cisco Systems

More information

A Perspective on V2X in the United States

A Perspective on V2X in the United States A Perspective on V2X in the United States John B. Kenney, Ph.D Director and Principal Researcher Toyota InfoTechnology Center, USA jkenney@us.toyota-itc.com November 14, 2017 SIP-adus Workshop on Connected

More information

Backdooring the Front Door

Backdooring the Front Door Backdooring the Front Door About me Software Engineer by trade Hacker by passion Lock picker for fun The best puzzles are not meant to be solved All opinions are my own, and may not reflect those of my

More information

WHY YOUR NAC PROJECTS KEEP FAILING: ADDRESSING PRODUCTS, PEOPLE, PROCESSES

WHY YOUR NAC PROJECTS KEEP FAILING: ADDRESSING PRODUCTS, PEOPLE, PROCESSES SESSION ID: TECH-W14 WHY YOUR NAC PROJECTS KEEP FAILING: ADDRESSING PRODUCTS, PEOPLE, PROCESSES Jennifer Minella VP of Engineering & Security Carolina Advanced Digital, Inc. @jjx securityuncorked.com @CADinc

More information

Acyclica Congestion Management. By Sarah King Regional Sales Manager Control Technologies

Acyclica Congestion Management. By Sarah King Regional Sales Manager Control Technologies Acyclica Congestion Management By Sarah King Regional Sales Manager Control Technologies Overview 1. Goals 2. Data Collection 3. Measuring Congestion 4. Travel Time 5. Intersection Delay 6. Origin/Destination

More information

ipads in Education: Preparing your Network for the ipads in the Classroom (and other mobile devices)

ipads in Education: Preparing your Network for the ipads in the Classroom (and other mobile devices) ipads in Education: Preparing your Network for the ipads in the Classroom (and other mobile devices) Schools Must Upgrade to Support the ipad Bring your own device and ipad in the classroom programs are

More information

To realize Connected Vehicle Society. Yosuke NISHIMURO Ministry of Internal Affairs and Communications (MIC), Japan

To realize Connected Vehicle Society. Yosuke NISHIMURO Ministry of Internal Affairs and Communications (MIC), Japan To realize Connected Vehicle Society Yosuke NISHIMURO Ministry of Internal Affairs and Communications (MIC), Japan Services provided by Connected Vehicle 1 Vehicle 5G V2X Connected Vehicle Big Data AI

More information

Distracted Work. Kentucky Crushed Stone Association - Annual Safety & Education Seminar February Robert Jameson, Central Mine Services, Inc.

Distracted Work. Kentucky Crushed Stone Association - Annual Safety & Education Seminar February Robert Jameson, Central Mine Services, Inc. Distracted Work Kentucky Crushed Stone Association - Annual Safety & Education Seminar February 2018 Robert Jameson, Central Mine Services, Inc. Has anyone else seen people like this lately? Seems like

More information

Section 4 Cracking Encryption and Authentication

Section 4 Cracking Encryption and Authentication Section 4 Cracking 802.11 Encryption and Authentication In the previous section we showed the vulnerabilities of Open Wireless LANs. In this section we ll show some of the techniques and tools used to

More information

Improving Your Network Defense. Joel M Snyder Senior Partner Opus One

Improving Your Network Defense. Joel M Snyder Senior Partner Opus One Improving Your Network Defense Joel M Snyder Senior Partner Opus One jms@opus1.com Agenda: Improving Your Network Defense What s the Thesis? Intrusion Detection Collecting Information Enabling Features

More information

Wireless Connectivity: Future Evolution of the Mobile Network

Wireless Connectivity: Future Evolution of the Mobile Network Wireless Connectivity: Future Evolution of the Mobile Network Simon Yeung Executive Director, Comba Telecom Systems Holdings 26 May 2017 President, Comba Telecom Systems International 2017 Comba Telecom.

More information

Federal Agency Firewall Management with SolarWinds Network Configuration Manager & Firewall Security Manager. Follow SolarWinds:

Federal Agency Firewall Management with SolarWinds Network Configuration Manager & Firewall Security Manager. Follow SolarWinds: Federal Agency Firewall Management with SolarWinds Network Configuration Manager & Firewall Security Manager Introduction What s different about Federal Government Firewalls? The United States Federal

More information

MIS 300 Exam 2 Spring 2011

MIS 300 Exam 2 Spring 2011 MIS 300 Exam 2 Spring 2011 Name: Instructions Turn off your cell phone. Close your notes and book. Answer each question by selecting the best response. For True/False questions, select A for and B for.

More information

User Fingerprinting

User Fingerprinting A Report on 802.11 User Fingerprinting - Authors - Jeffrey Pang, Carnegie Mellon Univ Ben Greenstein, Intel Corp (Seattle) Ramakrishna Gummadi, Univ of So Cal Srinivasan Seshan, Carnegie Mellon Univ David

More information

Connect Vehicles: A Security Throwback

Connect Vehicles: A Security Throwback Connect Vehicles: A Security Throwback Chris Valasek (@nudehaberdasher) Director of Vehicle Security Research Introduction Hello Chris Valasek Director of Vehicle Security Research IPS Dev -> Windows RE

More information

Hello? It s Me, Your Not So Smart Device. We Need to Talk.

Hello? It s Me, Your Not So Smart Device. We Need to Talk. SESSION ID: SBX1-R2 Hello? It s Me, Your Not So Smart Device. We Need to Talk. Alex Jay Balan Chief Security Researcher Bitdefender @jaymzu IoT is not optional 2 IoT is not optional IoT = hardware + OS

More information

HACKING EXPOSED WIRELESS: WIRELESS SECURITY SECRETS & SOLUTIONS SECOND EDITION JOHNNY CACHE JOSHUA WRIGHT VINCENT LIU. Mc Graw mim

HACKING EXPOSED WIRELESS: WIRELESS SECURITY SECRETS & SOLUTIONS SECOND EDITION JOHNNY CACHE JOSHUA WRIGHT VINCENT LIU. Mc Graw mim HACKING EXPOSED WIRELESS: WIRELESS SECURITY SECRETS & SOLUTIONS SECOND EDITION JOHNNY CACHE JOSHUA WRIGHT VINCENT LIU Mc Graw mim CONTENTS Foreword Acknowledgments Introduction xvn xlx XX1 Hacking 802.11

More information

Omar Alrawi. Security Evaluation of Home-based IoT Deployments

Omar Alrawi. Security Evaluation of Home-based IoT Deployments Omar Alrawi Security Evaluation of Home-based IoT Deployments About Us Astrolavos Research Lab at Georgia Tech We specialize in Network Security Measurements Work is presented on behalf of my team Omar

More information

Overview apps and software applications of Nedap N.V. related to privacy

Overview apps and software applications of Nedap N.V. related to privacy Overview apps and software applications of Nedap N.V. related to privacy In the following overview you ll find per Nedap group a description concerning the various software applications and portals of:

More information

Calcanas 1. Edgar Calcanas Dr. Narayanan CST March 2010 CST 412 Mid-Term. Workstations

Calcanas 1. Edgar Calcanas Dr. Narayanan CST March 2010 CST 412 Mid-Term. Workstations Calcanas 1 Edgar Calcanas Dr. Narayanan CST 412 17 March 2010 CST 412 Mid-Term Workstations 1) Every employee must have its own workstation, for our potential client NOPI. We must provide a workstation

More information

A Configuration Protocol for Embedded Devices on Secure Wireless Networks

A Configuration Protocol for Embedded Devices on Secure Wireless Networks A Configuration Protocol for Embedded Devices on Secure Wireless Networks Larry Sanders lsanders@ittc.ku.edu 6 May 2003 Introduction Wi-Fi Alliance Formally Wireless Ethernet Compatibility Alliance (WECA)

More information

Securing Internet of things Infrastructure Standard and Techniques

Securing Internet of things Infrastructure Standard and Techniques Securing Internet of things Infrastructure Standard and Techniques Paper Author : Zubair A. Baig Name: Farooq Abdullah M.Sc Programming and Networks University of Oslo. Security internet of Things Standards

More information

Wireless# Guide to Wireless Communications. Objectives

Wireless# Guide to Wireless Communications. Objectives Wireless# Guide to Wireless Communications Chapter 8 High-Speed WLANs and WLAN Security Objectives Describe how IEEE 802.11a networks function and how they differ from 802.11 networks Outline how 802.11g

More information

How to install TEOS Connect on BRAVIA Professional Displays. Version 1. 11/04/18 TEOS Connect installation

How to install TEOS Connect on BRAVIA Professional Displays. Version 1. 11/04/18 TEOS Connect installation How to install TEOS Connect on BRAVIA Professional Displays Version 1 11/04/18 TEOS Connect installation Contents Introduction 3 Pre-requisites 4 Step-by-step installation 5 Q&A 16 2 TEOS Connect installation

More information

AURA ACADEMY Training With Expertised Faculty Call Us On For Free Demo

AURA ACADEMY Training With Expertised Faculty Call Us On For Free Demo ETHICAL HACKING (CEH) CURRICULUM Introduction to Ethical Hacking What is Hacking? Who is a Hacker? Skills of a Hacker? Types of Hackers? What are the Ethics and Legality?? Who are at the risk of Hacking

More information

TOP DEVELOPERS MINDSET. All About the 5 Things You Don t Know.

TOP DEVELOPERS MINDSET. All About the 5 Things You Don t Know. MINDSET TOP DEVELOPERS All About the 5 Things You Don t Know 1 INTRODUCTION Coding and programming are becoming more and more popular as technology advances and computer-based devices become more widespread.

More information

Attacking Networks. Joshua Wright LightReading LIVE! October 1, 2003

Attacking Networks. Joshua Wright LightReading LIVE! October 1, 2003 Attacking 802.11 Networks Joshua Wright Joshua.Wright@jwu.edu LightReading LIVE! October 1, 2003 Attention The material presented here reflects the personal experience and opinions of the author, and not

More information

Securing Vehicle ECUs Update Over the Air

Securing Vehicle ECUs Update Over the Air Securing Vehicle ECUs Update Over the Air Kevin Daimi University of Detroit Mercy, USA Mustafa Saed, Scott Bone, Muhammad Rizwan HATCI Electronic Systems Development, USA 2 Electronic Control Units Modern

More information

The Global Leader in Thin Client Management & Industrial Mobility Solutions

The Global Leader in Thin Client Management & Industrial Mobility Solutions The Global Leader in Thin Client Management & Industrial Mobility Solutions A Rockwell Automation Technology The Global Leader in Thin Client Management & Industrial Mobility Solutions Deliver the right

More information

Validating the Security of the Borderless Infrastructure

Validating the Security of the Borderless Infrastructure SESSION ID: CDS-R01 Validating the Security of the Borderless Infrastructure David DeSanto Director, Product Management Spirent Communications, Inc. @david_desanto Agenda 2 The Adversary The Adversary

More information

Preparing your network for the next wave of innovation

Preparing your network for the next wave of innovation Preparing your network for the next wave of innovation The future is exciting. Ready? 2 Executive brief For modern businesses, every day brings fresh challenges and opportunities. You must be able to adapt

More information

Smart Grid Labs. Overview

Smart Grid Labs. Overview Smart Grid Labs Overview introduction SGL provides our clients multi-faceted assessment services for communications, security, standards compliance, technology/vendor maturity, and implementation assistance

More information

Ipod Touch 3rd Generation Wifi Doesn't Work

Ipod Touch 3rd Generation Wifi Doesn't Work Ipod Touch 3rd Generation Wifi Doesn't Work Doesn't work for me. I can't see my third generation Apple TV from my iphone 5S running ios 8 unless both are on the same wi-fi network. Bluetooth is turned.

More information

Manually Connected To Wireless Network Macbook Pro Will Not Stay

Manually Connected To Wireless Network Macbook Pro Will Not Stay Manually Connected To Wireless Network Macbook Pro Will Not Stay Learn how to troubleshoot Wi-Fi network connectivity issues on your Mac. using OS X Mountain Lion or later, you can use Wireless Diagnostics

More information

THE IMPORTANCE OF NICHE TECHNOLOGIES IN BUSINESS ANALYSIS. - Kat Okwera Jan 2019

THE IMPORTANCE OF NICHE TECHNOLOGIES IN BUSINESS ANALYSIS. - Kat Okwera Jan 2019 THE IMPORTANCE OF NICHE TECHNOLOGIES IN BUSINESS ANALYSIS - Kat Okwera Jan 2019 HEY THERE I M A BA TOO! Kat Okwera Programmer Systems Designer Web Developer Project Manager Business Analyst E-Learning

More information

CYBER SECURITY FOR BUSINESS COUNTING THE COSTS, FINDING THE VALUE

CYBER SECURITY FOR BUSINESS COUNTING THE COSTS, FINDING THE VALUE CYBER SECURITY FOR BUSINESS COUNTING THE COSTS, FINDING THE VALUE Business has always looked to squeeze the maximum possible benefit out of IT resources at the lowest possible cost but measuring return

More information

Internet of Things Toolkit for Small and Medium Businesses

Internet of Things Toolkit for Small and Medium Businesses Your Guide #IoTatWork to IoT Security #IoTatWork Internet of Things Toolkit for Small and Medium Businesses Table of Contents Introduction 1 The Internet of Things (IoT) 2 Presence of IoT in Business Sectors

More information

Can Delete Sharing Folder Windows 7 Access Denied

Can Delete Sharing Folder Windows 7 Access Denied Can Delete Sharing Folder Windows 7 Access Denied File and folder permissions on Windows are pretty great when they're working for you but when the OS suddenly decides to deny access to a folder on your

More information

CLIENT ONBOARDING PLAN & SCRIPT

CLIENT ONBOARDING PLAN & SCRIPT CLIENT ONBOARDING PLAN & SCRIPT FIRST STEPS Receive Order form from Sales Representative. This may come in the form of a BPQ from client Ensure the client has an account in Reputation Management and in

More information

How To Manually Install Ios 7 On Iphone 4s With Itunes >>>CLICK HERE<<<

How To Manually Install Ios 7 On Iphone 4s With Itunes >>>CLICK HERE<<< How To Manually Install Ios 7 On Iphone 4s With Itunes Also, devices that ship with ios 8 preinstalled like the iphone 6 and 6 Plus are ios 8 is great, no reason to downgrade UNLESS you're on an iphone

More information

SMART CAMPUS, BUILDING AND VENUES

SMART CAMPUS, BUILDING AND VENUES SMART CAMPUS, BUILDING AND VENUES Greg Deffenbaugh, Corporate Solutions Technologist SDS & Hospitality SDN Solutions and Strategy, Avaya @gregdeff gregdeff 1 Thank you Sponsors! Global Sponsors Gold Sponsors

More information

TestsDumps. Latest Test Dumps for IT Exam Certification

TestsDumps.  Latest Test Dumps for IT Exam Certification TestsDumps http://www.testsdumps.com Latest Test Dumps for IT Exam Certification Exam : PW0-200 Title : Certified wireless security professional(cwsp) Vendors : CWNP Version : DEMO Get Latest & Valid PW0-200

More information

Securing Wireless Networks by By Joe Klemencic Mon. Apr

Securing Wireless Networks by By Joe Klemencic Mon. Apr http://www.cymru.com/ Securing Wireless Networks by By Joe Klemencic (faz@home.com) Mon. Apr 30 2001 Many companies make attempts to embrace new technologies, but unfortunately, many of these new technologies

More information

The network s impact on student and staff experience. Client-centric Analytics and Assurance Darren Smith Aruba Networks

The network s impact on student and staff experience. Client-centric Analytics and Assurance Darren Smith Aruba Networks The network s impact on student and staff experience Client-centric Analytics and Assurance Darren Smith Aruba Networks Growing IT Challenges More User Devices, Apps and Services Legacy Tools Limited Resources

More information

Connected Cars as the next great consumer electronics device

Connected Cars as the next great consumer electronics device Connected Cars as the next great consumer electronics device Sanjay Khatri Head of Platform Product Marketing Cisco Jasper 1992 2016 Cisco Systems, Inc. All rights reserved. Connected Cars: The next great

More information

ANATOMY OF AN ATTACK!

ANATOMY OF AN ATTACK! ANATOMY OF AN ATTACK! Are Your Crown Jewels Safe? Dom Kapac, Security Evangelist WHAT DO WE MEAN BY CROWN JEWELS? Crown jewels for most organizations are critical infrastructure and data Data is a valuable

More information

THE APPLICATIONS OF ADVANCED TECHNOLOGIES TO AUTOMATE TRAVEL TIMES Port Aransas Ferry Operations Project

THE APPLICATIONS OF ADVANCED TECHNOLOGIES TO AUTOMATE TRAVEL TIMES Port Aransas Ferry Operations Project THE APPLICATIONS OF ADVANCED TECHNOLOGIES TO AUTOMATE TRAVEL TIMES Port Aransas Ferry Operations Project America B. Garza, P.E. Corpus Christi District October 15, 2014 Presentation Agenda 1 Introduction

More information

The Challenges of Measuring Wireless Networks. David Kotz Dartmouth College August 2005

The Challenges of Measuring Wireless Networks. David Kotz Dartmouth College August 2005 The Challenges of Measuring Wireless Networks David Kotz Dartmouth College August 2005 Why measure? For better management Large WLANs need scalable management To manage you must monitor To monitor you

More information

Practical SCADA Cyber Security Lifecycle Steps

Practical SCADA Cyber Security Lifecycle Steps Practical SCADA Cyber Security Lifecycle Steps Standards Certification Jim McGlone CMO, Kenexis Education & Training Publishing Conferences & Exhibits Bio Jim McGlone, CMO, Kenexis GICSP ISA Safety & Security

More information