A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Subscribestar or Patreon

Search Irongeek.com:

Irongeek Button
Social-engineer-training Button

Help Irongeek.com pay for bandwidth and research equipment:


Cruise Ship Security OR Hacking the High Seas - Chad M. Dewey Derbycon 2016 (Hacking Illustrated Series InfoSec Tutorial Videos)

Cruise Ship Security OR Hacking the High Seas
Chad M. Dewey
Derbycon 2016

Taking a cruise vacation should be a laid back, care-free endeavor that allows one to unwind, have a few drinks, explore new countries, and get sunburned. For many, there is not much thought put in to how the cruise ships operate or how secure your stored information is on the ship. After all - you're on vacation. In this presentation, three leading cruise lines have been evaluated in several different security realms over the last 10 years. These areas include physical security, social engineering, wifi vulnerabilities, segregation of passenger network from operations network, financial transactions, information sanitization, and more. Some vulnerabilities are simple hacks to allow one to obtain free wifi, while others are more complex and allow one to explore the ship in more obscure ways. In this presentation, successes and failures of hacking the high seas will be shown.

Just a regular Joe with a background in network and information security, Chad M. Dewey is a Computer Science and Information Systems Professor at Saginaw Valley State University in Michigan. While his interests include all things security, he takes a particular interest in the security of "weird stuff" like medical equipment, automobiles, and cruise ships. Chad had participated in Intel's Automotive Security Research Board in January of 2016, along with 15 other security professionals, to test the security of automobile "In-Vehicle Infotainment Systems".


Back to Derbycon 2016 video list

Printable version of this article

15 most recent posts on Irongeek.com:

If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast