44 subscribers
使用Player FM应用程序离线!
值得一听的播客
赞助
CCT 214: IoT Security Vulnerabilities and Implementing Secure Design - Voice (Domain 4.3)
Manage episode 463385856 series 3464644
Unlock the secrets of voice security and communication evolution with Shon Gerber on the CISSP Cyber Training Podcast. We tackle the intriguing issue of Subaru's Starlink vulnerability, which Wired Magazine recently spotlighted. This flaw, affecting about a million vehicles, highlights the growing security challenges of IoT and connected vehicles, echoing similar vulnerabilities in other brands like Acura and Toyota. Tune in to discover how these incidents shape the landscape of cybersecurity in the automotive industry.
Journey through the fascinating history of communication systems, from the hands-on days of telephone operators to the seamless digital networks we rely on today. Explore the transformation of circuit switch networks and the critical role played by SS7 systems, all while navigating the complex security risks they introduce, such as interception and eavesdropping. Gain insight into how technological progress has bridged global communication gaps and the essential awareness required to address the concomitant security implications.
Our conversation takes a deep dive into the world of secure voice communications, examining the transition from traditional analog methods to modern VoIP technology. With threats like eavesdropping, man-in-the-middle attacks, and denial of service on SIP protocols, understanding the nuances of VoIP security is crucial. We also demystify social engineering tactics like vishing and phreaking, offering strategies to bolster defenses against these manipulative threats. Prepare to enhance your cybersecurity expertise and safeguard your systems with practical advice and cutting-edge information.
Gain exclusive access to 360 FREE CISSP Practice Questions delivered directly to your inbox! Sign up at FreeCISSPQuestions.com and receive 30 expertly crafted practice questions every 15 days for the next 6 months—completely free! Don’t miss this valuable opportunity to strengthen your CISSP exam preparation and boost your chances of certification success. Join now and start your journey toward CISSP mastery today!
章节
1. CISSP Cyber Training Podcast Overview (00:00:00)
2. Switching Networks in Communication Systems (00:10:27)
3. Ensuring Secure Voice Communications (00:16:47)
4. Social Engineering and Telecommunication Exploitation (00:24:43)
5. CISSP Training Question Access (00:36:15)
238集单集
Manage episode 463385856 series 3464644
Unlock the secrets of voice security and communication evolution with Shon Gerber on the CISSP Cyber Training Podcast. We tackle the intriguing issue of Subaru's Starlink vulnerability, which Wired Magazine recently spotlighted. This flaw, affecting about a million vehicles, highlights the growing security challenges of IoT and connected vehicles, echoing similar vulnerabilities in other brands like Acura and Toyota. Tune in to discover how these incidents shape the landscape of cybersecurity in the automotive industry.
Journey through the fascinating history of communication systems, from the hands-on days of telephone operators to the seamless digital networks we rely on today. Explore the transformation of circuit switch networks and the critical role played by SS7 systems, all while navigating the complex security risks they introduce, such as interception and eavesdropping. Gain insight into how technological progress has bridged global communication gaps and the essential awareness required to address the concomitant security implications.
Our conversation takes a deep dive into the world of secure voice communications, examining the transition from traditional analog methods to modern VoIP technology. With threats like eavesdropping, man-in-the-middle attacks, and denial of service on SIP protocols, understanding the nuances of VoIP security is crucial. We also demystify social engineering tactics like vishing and phreaking, offering strategies to bolster defenses against these manipulative threats. Prepare to enhance your cybersecurity expertise and safeguard your systems with practical advice and cutting-edge information.
Gain exclusive access to 360 FREE CISSP Practice Questions delivered directly to your inbox! Sign up at FreeCISSPQuestions.com and receive 30 expertly crafted practice questions every 15 days for the next 6 months—completely free! Don’t miss this valuable opportunity to strengthen your CISSP exam preparation and boost your chances of certification success. Join now and start your journey toward CISSP mastery today!
章节
1. CISSP Cyber Training Podcast Overview (00:00:00)
2. Switching Networks in Communication Systems (00:10:27)
3. Ensuring Secure Voice Communications (00:16:47)
4. Social Engineering and Telecommunication Exploitation (00:24:43)
5. CISSP Training Question Access (00:36:15)
238集单集
Усі епізоди
×




1 CCT 233: Practice CISSP Questions - Managing Authentication in the Modern Enterprise (CISSP Domain 5.2) 16:47







1 CCT Vendor 01: The Blurry Line: Where Physical Security Meets Cybersecurity - SecurePassage.com 38:02








1 CCT 219: Practice CISSP Questions - Mastering Vulnerability Assessments and Network Scanning for the CISSP (D6.2.1) 20:12

1 CCT 218: Design and validate assessment, test, and audit strategies for the CISSP (Domain 6.1) 34:43



1 CCT 215: Practice CISSP Questions - JMAGIC Malware and Implementing Secure Design - Voice (Domain 4.3) 21:53


1 CCT 213: Practice CISSP Questions - DORA, Memory Protection and Virtualization Security for CISSP Success (Domain 3.4) 22:13


1 CCT 211: Practice CISSP Questions - Data Security Controls and Compliance Requirements (Domain 2.3) 18:21


1 CCT 209: Practice CISSP Questions - Digital Evidence, Forensics, and Investigation (Domain 1.6) 21:34

1 CCT 208: Navigating Digital Evidence, Forensics, and Investigation Types for CISSP Success (Domain 1.6) 45:33

1 CCT 207: Practice CISSP Questions - Assess Security Impact of Acquired Software (Domain 8.4) 23:34


1 CCT 205: Practice CISSP Questions - Apply Foundational Security Operations Concepts (Domain 7.4) 23:27

1 CCT 204: Need to Know, Least Privilege, Job Rotation and Other Options in Security Operations (Domain 7.4) 36:45

1 CCT 203: Practice CISSP Questions - Understanding Vulnerability Scans, Risk Management, and Cyber Threat Mitigation Strategies (Domain 6.4) 28:20

1 CCT 202: Understanding Vulnerability Scans, Risk Management, and Cyber Threat Mitigation Strategies (Domain 6.4) 41:54

1 CCT 201: Practice CISSP Questions - Hardware and Firmware Knowledge Gap and Access Controls (Domain 5) 23:08


1 CCT 199: Practice CISSP Questions - DNSSEC, IPSec, DoH, DoT and other Networking Security (Domain 4) 23:27


1 CCT 197: Practice CISSP Questions - Security Architectures, Design, and Solution Elements for the CISSP 19:46


1 CCT 195: Practice CISSP Questions - End-of-Life Systems: Balancing Cost, Compliance, and Security for CISSP Success (Domain 2.5) 15:03

欢迎使用Player FM
Player FM正在网上搜索高质量的播客,以便您现在享受。它是最好的播客应用程序,适用于安卓、iPhone和网络。注册以跨设备同步订阅。