Wireless communications offer organizations and users many benefits such as portability and flexibility, increased productivity, and lower installation costs. Wireless local area network (WLAN) devices, for instance, allow users to move their laptops from place to place within their offices without the need for wires and without losing network connectivity. Less wiring means greater flexibility, increased efficiency, and reduced wiring costs. In our Presentation we first confer the various functionalities of Wireless communication and state the applications of Bluetooth Technology. Further we move on to discuss the risks and problems inherent in using Bluetooth. We precede the discussion to narrate the key characteristics of Bluetooth and a few implementations of Bluetooth Technology with pictures. As we move to the core of paper we itemize the benefits of Bluetooth and carry on with various security modes of Bluetooth technology. Not only have this but we even enclosed the problems with Bluetooth security. Finally we wind up our discussion suggesting some Management, Technical and Operational recommendations.
[...] Unauthorized users may gain access to agency systems and information, corrupt the agency's data, consume network bandwidth, degrade network performance and launch attacks that prevent authorized users from accessing the network, or use agency resources to launch attacks on other networks Bluetooth Overview Adhoc networks today are based primarily on Bluetooth technology. Bluetooth is an open standard for short-range digital radio. It is touted as a low-cost, low-power, and low-profile technology that provide a mechanism for creating small wireless networks on an adhoc basis. [...]
[...] Use smart card technology in the Bluetooth network to provide key management. Install antivirus software on intelligent, Bluetooth-enabled hosts. Fully test and deploy software Bluetooth patches and upgrades regularly. Deploy user authentication such as biometrics, smart cards, two- factor authentication, or PKI. Deploy intrusion detection agents on the wireless part of the network to detect suspicious behavior or unauthorized access and activity. Fully understand the impacts of deploying any security feature or product prior to deployment. Designate an individual to track the progress of Bluetooth security products and standards (perhaps via the Bluetooth SIG) and the threats and vulnerabilities with the technology. [...]
[...] Internet connectivity Security of Bluetooth Bluetooth has three different modes of security. Each Bluetooth device can operate in one mode only at a particular time. The three modes are the following: Security Mode 1—Nonsecure mode Security Mode 2—Service-level enforced security mode Security Mode 3—Link-level enforced security mode In Security Mode a device will not initiate any security procedures. In this nonsecure mode, the security functionality (authentication and encryption) is completely bypassed. In effect, the Bluetooth device in Mode 1 is in a “promiscuous” mode that allows other Bluetooth devices to connect to it. [...]
[...] Ensure that users on the network are fully trained in computer security awareness and the risks associated with wireless technology (i.e., Bluetooth). Perform a risk assessment to understand the value of the assets in the agency that need protection. Perform comprehensive security assessments at regular intervals to fully understand the wireless network security posture. Ensure that the wireless “network” is fully understood. With Pico nets forming scatter-nets with possible connections to networks and connections to both wired and wireless wide area networks. [...]
APA Style reference
For your bibliographyOnline reading
with our online readerContent validated
by our reading committee