1 / 20

BLUETOOTH

BLUETOOTH. Vicki Bennett. Bluetooth defined:. Bluetooth is a wireless networking standard created for personal area networks (PANs). Bluetooth is a cable replacement technology. Bluethooth is an IEEE standard under the denomination of 802.15 WPANs. Uses for Bluetooth. Cable replacement for:

dayton
Download Presentation

BLUETOOTH

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. BLUETOOTH Vicki Bennett

  2. Bluetooth defined: • Bluetooth is a wireless networking standard created for personal area networks (PANs). • Bluetooth is a cable replacement technology. • Bluethooth is an IEEE standard under the denomination of 802.15 WPANs.

  3. Uses for Bluetooth Cable replacement for: • Cell phone, mouse, keyboard, cordless headset, camera, PDA, printer, computer, data capture and even some hospital equipment. • Internet access.

  4. Features • Bluetooth provides cheap connection between two or more devices. • Bluetooth has a short range of approximately 10 meters up to 25 meters. • Bluetooth offers low speeds of approximately 1Mbps.

  5. Features • Bluetooth operates at 2.4 GHz ISM frequency band. • The wireless personal area network (WPAN) technology is based on the Bluetooth specification.

  6. Bluetooth wireless technology encompasses several key points: • Bluetooth is an open specification that is publicly available and royalty free. • Bluetooth’s short-range wireless capability allows peripheral devices to communicate over a single air-interface (used to communicate between a base and handset), replacing the cables that use connectors with a multitude of shapes, sizes and numbers of pins.

  7. Bluetooth wireless technology encompasses several key points: • Bluetooth supports both voice and data, making it an ideal technology to enable many types of devices to communicate. • Bluetooth uses an unregulated frequency band available anywhere in the world. • Bluetooth allows large numbers of piconets (master device connected to seven slaves) to form a scatternet.

  8. Scatternet: • A scatternet is a group of independent and non-synchronized piconets that share at least one common Bluetooth device. • Bluetooth devices must have point-to-multipoint capability to engage in scatternet communication. • There may be a maximum of 10 fully loaded piconets in a scatternet.

  9. Security is a huge concern: • Hackers are using Bluetooth to attack mobile devices such as mobile phones, PDAs, laptops, and handsets.

  10. Security concerns: • There are a number of different types of attacks: -- attempts to steal data -- service disruption -- malware distribution

  11. Bluejacking: • Bluejacking exploits a Bluetooth device’s ability to discover other nearby devices to send unsolicited messages. • The unsolicited message is then displayed on the victim’s device, potentially causing confusion or at least annoyance.

  12. Bluesnarfing: • Bluesnarfing is when the attacker connects to a device without the device owner being notified, and accesses local data. • Such local data can include potentially valuable information such as address books and calendars.

  13. Bluebug Attack: • A Bluebug Attack is when attackers are able to create a serial connection to the victim device and use this to control data services on the device. • This allows them to connect to data services, send and receive messages, and initial phone calls.

  14. Minimizing the security risks: • Immediately identify alert users to known vulnerabilities. • In an organization, avoid the use of unauthorized add-ons such as long-range transmitters. • Educate the staff to Bluesnarfing, Bluejacking, and Bluebug Attacks.

  15. Minimizing the risks: • Use caution when pairing devices. • The independence on PINs to create encrypted connection between devices is the only known significant vulnerability in the Bluetooth specification and are easy for hackers to discover.

  16. Minimizing the risks: • Look for products with control over Bluetooth. • Many PDAs feature a switch that lets users turn wireless on and off making it easier to turn off the wireless when not in use.

  17. Minimizing the risks: • Consider tools for identifying and mitigating security risks. • Deploy tools to both scan their environments for use of Bluetooth technologies as well as monitor managed endpoints for such device connections.

  18. Conclusion: Bluetooth allows the individual to use and network convenient wireless devices. The technology is ingrained in society today. Caution should be used when securing any device using Bluetooth.

  19. Use of Bluetooth within the Schools • Students can access information and communicate from anywhere in the building and on field trips by using hand-held devices using Bluetooth. • Allows the students to remain actively involved in the activity or learning experience. • Allows for easy download of data. • Allows for easy communication with other students and the teacher.

  20. Works cited: Panko, Raymond R. (2005). Business data networks and telecommunications. Pearson Prentice Hall. Upper Saddle River, NJ, pp. 242-243. Hernacki, Brian. (2006). Improving bluetooth security: What IT managers and mobile device users can do. Telecommunication and Network Security, pp. 39-42. Youquan Zheng, Zhenming Feng. (2004). Simplification of the Bluetooth Radio Device. Networking today, pp. 108-115. Technology Review. (2002). Automatic Networks: Devices that connect themselves could change networking, pp. 20-21.

More Related