bluetooth security overview

bluetooth security overview

Overall security description Risks are inherent to any wireless technology. Some of these risks are similar to those of wired networks; some are exacerbated by wireless connectivity; some are new. Perhaps the most significant source of risks in wireless networks is that the technology’s underlying communications medium, the airwave, is open to intruders, making it the logical equivalent of an Ethernet port in the parking lot. Specific threats and vulnerabilities to wireless networks and handheld devices include the following: All the vulnerabilities that exist in a conventional wired network apply to wireless technologies. Malicious entities may gain unauthorized access to an agency’s computer network through wireless connections, bypassing any firewall protections. Sensitive information that is not encrypted (or that is encrypted with poor cryptographic techniques) and that is transmitted between two wireless devices may be intercepted and disclosed. DoS attacks may be directed at wireless connections or devices. Malicious entities may steal the identity of legitimate users and masquerade as them on internal or external corporate networks. Sensitive data may be corrupted during improper synchronization. Malicious entities may be able to violate the privacy of legitimate users and be able to track their movements. Malicious entities may deploy unauthorized equipment (e.g., client devices and access points) to surreptitiously gain access to sensitive information. Handheld devices are easily stolen and can reveal sensitive information. Data may be extracted without detection from improperly configured devices. Viruses or other malicious code may corrupt data on a wireless device and subsequently be introduced to a wired network connection. Malicious entities may, through wireless connections, connect to other agencies or organizations for the purposes of launching attacks and concealing their activities. Interlopers, from inside or out, may be able to gain connectivity to network management controls and thereby disable or disrupt operations. Malicious entities may use third-party, untrusted wireless network services to gain access to an agency’s or other organization’s network resources. Internal attacks may be possible via ad hoc transmissions. Bluetooth security overview Bluetooth has three different modes of security. Each Bluetooth device can operate in one mode only at a particular time. The three modes are the following:  Security Mode 1: Nonsecure mode  Security Mode 2: Service-level enforced security mode  Security Mode 3: Link-level enforced security mode

Free download research paper


Understanding the spreading patterns of mobile phone viruses

On Line Fingerprint Verification CSE PROJECTS