YoVDO

Drone Attacks on Industrial Wireless - A New Front in Cyber Security

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Wireless Security Courses

Course Description

Overview

Explore the emerging threats and defensive strategies in industrial wireless security as drones become a new vector for cyber attacks. Delve into electronic warfare concepts, recent jamming incidents, and advanced drone capabilities that challenge traditional assumptions about cyber-physical security. Learn about electronic defensive measures, planning strategies, and the potential of drones as delivery platforms for electronic attacks. Gain insights into the need for mesh network topologies in industrial wireless systems and understand the importance of securing overhead areas. Examine the interplay between industrial wireless networks, electromagnetic interference, and distance considerations in this comprehensive analysis of the evolving landscape of industrial cybersecurity.

Syllabus

Intro
About Jeff Melrose
Cyber Physical defined
Electronic Cyber Physical Reality vs Assumptions
Electronic Warfare the new Cyber Frontier
Basic Electronic Warfare Terms
Did someone say Lasers?
Recent Electronic jamming incidents
So a Funny thing happened in our Net Lab one day
Drones carrying Disrupters to Industrial Wireless Antennas?
Can a Drone maintain Electromagnetic Distance Autonomously? On a fast moving target?
Can a Drone keep a Transmitter close Autonomously to a target?
Can a Drone keep a Transmitter close Autonomously? On a stationary target?
Can a Drone keep a Transmitter close Autonomously? On a Mowing target?
Industrial Wireless will need to go with MESH network topologies
Industrial Wireless Networks vs EMI vs Distance
Certain overhead areas need to be secured


Taught by

Black Hat

Related Courses

Attack on Titan M, Reloaded - Vulnerability Research on a Modern Security Chip
Black Hat via YouTube
Attacks From a New Front Door in 4G & 5G Mobile Networks
Black Hat via YouTube
AAD Joined Machines - The New Lateral Movement
Black Hat via YouTube
Better Privacy Through Offense - How to Build a Privacy Red Team
Black Hat via YouTube
Whip the Whisperer - Simulating Side Channel Leakage
Black Hat via YouTube