Download presentation
Presentation is loading. Please wait.
Published byMelissa Park Modified over 9 years ago
1
Bluetooth Presented by Venkateshwar R Gotur CMPT - 320
2
AGENDA Bluetooth Overview Types of Bluetooth enabled devices and technology Benefits of Bluetooth Bluetooth Security, Vulnerabilities and Threads Security Recommendations, Needs and Requirements.
3
Bluetooth Overview Bluetooth was founded in 1998 by: Ericsson, Intel, IBM, Toshiba and Nokia Created in order to promote, shape an define the specification and position Bluetooth in the market place It name comes form the 10 th century Danish King Harald, who managed to unite Denmark and Norway
4
Continued… Bluetooth is a radio technology used for exchanging data over short distances Bluetooth is a standard and communication protocol primarily designed for low power consumption, with a short range based on low cost transceiver microchips in each device. Used within the devices like cell phones, laptops and other wireless devices to communicate.
6
Bluetooth Technology Short range (theoretically 10 –100m) Point to point or point to multipoint Wireless (ISM frequency band - 2.4GHz) Voice and data transfer ( up to 1Mb/s)
7
Bluetooth Enabled Devices Laptops Headset Printers Keyboards GPS Cellular Phones and many more….
8
Benefits of Bluetooth Cable replacement Ease of File sharing Wireless Synchronization Internet Connectivity Share capabilities
9
Bluetooth Vulnerability, Security and Threats Bluesnarfing Bluejacking Bluebugging Car Whisperer Denial of Service Fizzing Attacks Pin Cracking Bloover Blue smack Long distance snarf, etc
10
Bluesnarfing Unauthorized access of information from a wireless device. Loss of personal information. Can rout out calls to his/her cell phones. Works within the mechanism for exchanging business cards. OBEX (object exchange). Aims for discoverable and undiscoverable devices to be hacked based on brute force.
11
Continued…
12
Blue jacking Attacked by sending unsolicited messages to a user of Bluetooth enabled devices. Blue jack can create a phone book contact and write messages. Pop up messages from the hacker User can panic that his/her device is hacked.
13
Continued…
14
Bluebugging Bluebugging goes well beyond bluesnurfing and bluejacking. Allows hackers to completely takeover a Bluetooth device. Blue bug has capabilities like bluesnarfing. Bluebugger can pick up conversations in phone’s immediate area. Bluebugger manipulates “backdoor” attacks and many more etc….
15
Continued…
16
Security recommendations, needs and requirements. Disable Bluetooth, Turn off Bluetooth features when not in use. Paring security: Bluetooth devices should be paired up in a private physical setting to minimize the risk of potential attack. User should not respond to any messages requesting for a pin. Pin for Bluetooth devices should be changed on regular intervals with at least eight characters alphanumeric. Always Upgrade your devices to the latest technology.
17
Continued… Do not pair up with other devices if you feel its unsecure. Higher layer of encryption will also add an additional layer to security. With increase in Bluetooth enabled devices the user should establish connection only with trusted devices. Spatial distance can avoid other devices to gain access to your Bluetooth enabled device.
18
QUESTIONS QUESTIONS
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.