Security/Conferences/DerbyCon2011: Difference between revisions

Jump to navigation Jump to search
Line 52: Line 52:
Chis used publicly available information to show how an attacker could gain information on aircraft avionics and missile systems without having to directly attack the holder of the information. He used supplier and downstream consumers of the information and parts as well as the provided diagnostics information from manufacturers to find out he could then compromise avionics packages. Again and interesting look at using indirect methods to garner desired information about a normally closed and specialized topic.
Chis used publicly available information to show how an attacker could gain information on aircraft avionics and missile systems without having to directly attack the holder of the information. He used supplier and downstream consumers of the information and parts as well as the provided diagnostics information from manufacturers to find out he could then compromise avionics packages. Again and interesting look at using indirect methods to garner desired information about a normally closed and specialized topic.


== Jayson E. Street ==
== Jayson E. Street: Steal Everything, Kill Everyone, Cause Total Financial Ruin! (or how I walked in and misbehaved)  ==
This was a very entertaining talk that was an overview of physical penetration testing that Jason had done. he had video, pictures and all kinds of things he carried in his "vest of doom". This boiled down to that if we are not teaching users the right things to do then breaches of physical and social access are our (infosec) fault and not the fault of the user. We need to teach, test and reteach concepts so that users can be better protectors of our and their own information.


== Jamison Scheeres: Social Engineering is a Fraud ==
== Jamison Scheeres: Social Engineering is a Fraud ==
canmove, Confirmed users, Bureaucrats and Sysops emeriti
2,776

edits

Navigation menu