Episode 82 — Specialized Systems: OT, NFC, RFID, Bluetooth

This episode introduces specialized environments and technologies that appear in scenario questions as constrained systems with unique risks and operational expectations. You’ll learn OT constraints at a high level, emphasizing that safety and uptime drive conservative choices, then shift to NFC and RFID as short-range identity and access technologies where cloning, weak authentication, and replay become realistic threats. We’ll also cover Bluetooth risk patterns such as weak pairing, over-discoverability, spoofing behavior, and privacy leakage through device identifiers, along with how these weaknesses can expose sensitive context or enable unauthorized interaction. You’ll practice interpreting scenarios involving badge systems, proximity access, or Bluetooth broadcasts, choosing safe, authorized next steps and practical mitigations like stronger authentication, reduced discoverability, secure pairing policies, and radio hardening. By the end, you’ll be able to select answers that respect constraints, describe risk in plain language, and recommend controls that fit the technology and environment rather than applying generic IT assumptions. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.
Episode 82 — Specialized Systems: OT, NFC, RFID, Bluetooth
Broadcast by