1 / 18

Bluetooth Presented by Venkateshwar R Gotur CMPT - 320

Bluetooth Presented by Venkateshwar R Gotur CMPT - 320. AGENDA. Bluetooth Overview Types of Bluetooth enabled devices and technology Benefits of Bluetooth Bluetooth Security, Vulnerabilities and Threads Security Recommendations, Needs and Requirements. Bluetooth Overview.

xia
Download Presentation

Bluetooth Presented by Venkateshwar R Gotur CMPT - 320

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. BluetoothPresented byVenkateshwar R GoturCMPT - 320

  2. AGENDA • Bluetooth Overview • Types of Bluetooth enabled devices and technology • Benefits of Bluetooth • Bluetooth Security, Vulnerabilities and Threads • Security Recommendations, Needs and Requirements.

  3. Bluetooth Overview • Bluetooth was founded in 1998 by: Ericsson, Intel, IBM, Toshiba and Nokia • Created in order to promote, shape an define the specification and position Bluetooth in the market place • It name comes form the 10th century Danish King Harald, who managed to unite Denmark and Norway

  4. Continued… • Bluetooth is a radio technology used for exchanging data over short distances • Bluetooth is a standard and communication protocol primarily designed for low power consumption, with a short range based on low cost transceiver microchips in each device. • Used within the devices like cell phones, laptops and other wireless devices to communicate.

  5. Bluetooth Technology • Short range (theoretically 10 –100m) • Point to point or point to multipoint • Wireless (ISM frequency band - 2.4GHz) • Voice and data transfer ( up to 1Mb/s)

  6. Bluetooth Enabled Devices • Laptops • Headset • Printers • Keyboards • GPS • Cellular Phones and many more….

  7. Benefits of Bluetooth • Cable replacement • Ease of File sharing • Wireless Synchronization • Internet Connectivity • Share capabilities

  8. Bluetooth Vulnerability, Security and Threats • Bluesnarfing • Bluejacking • Bluebugging • Car Whisperer • Denial of Service • Fizzing Attacks • Pin Cracking • Bloover • Blue smack • Long distance snarf, etc

  9. Bluesnarfing • Unauthorized access of information from a wireless device. • Loss of personal information. • Can rout out calls to his/her cell phones. • Works within the mechanism for exchanging business cards. • OBEX (object exchange). • Aims for discoverable and undiscoverable devices to be hacked based on brute force.

  10. Continued…

  11. Blue jacking • Attacked by sending unsolicited messages to a user of Bluetooth enabled devices. • Blue jack can create a phone book contact and write messages. • Pop up messages from the hacker • User can panic that his/her device is hacked.

  12. Continued…

  13. Bluebugging • Bluebugging goes well beyond bluesnurfing and bluejacking. • Allows hackers to completely takeover a Bluetooth device. • Blue bug has capabilities like bluesnarfing. • Bluebugger can pick up conversations in phone’s immediate area. • Bluebugger manipulates “backdoor” attacks and many more etc….

  14. Continued…

  15. Security recommendations, needs and requirements. • Disable Bluetooth, Turn off Bluetooth features when not in use. • Paring security: Bluetooth devices should be paired up in a private physical setting to minimize the risk of potential attack. • User should not respond to any messages requesting for a pin. • Pin for Bluetooth devices should be changed on regular intervals with at least eight characters alphanumeric. • Always Upgrade your devices to the latest technology.

  16. Continued… • Do not pair up with other devices if you feel its unsecure. • Higher layer of encryption will also add an additional layer to security. • With increase in Bluetooth enabled devices the user should establish connection only with trusted devices. • Spatial distance can avoid other devices to gain access to your Bluetooth enabled device.

  17. QUESTIONS

More Related