BLUETOOTH - PowerPoint PPT Presentation

1 / 20
About This Presentation
Title:

BLUETOOTH

Description:

Bluetooth is a cable replacement technology. ... phone, mouse, keyboard, cordless headset, camera, PDA, printer, computer, data ... – PowerPoint PPT presentation

Number of Views:50
Avg rating:3.0/5.0
Slides: 21
Provided by: students55
Category:

less

Transcript and Presenter's Notes

Title: BLUETOOTH


1
BLUETOOTH
  • Vicki Bennett

2
Bluetooth defined
  • Bluetooth is a wireless networking standard
    created for personal area networks (PANs).
  • Bluetooth is a cable replacement technology.
  • Bluethooth is an IEEE standard under the
    denomination of 802.15 WPANs.

3
Uses for Bluetooth
  • Cable replacement for
  • Cell phone, mouse, keyboard, cordless headset,
    camera, PDA, printer, computer, data capture and
    even some hospital equipment.
  • Internet access.

4
Features
  • Bluetooth provides cheap connection between two
    or more devices.
  • Bluetooth has a short range of approximately 10
    meters up to 25 meters.
  • Bluetooth offers low speeds of approximately
    1Mbps.

5
Features
  • Bluetooth operates at 2.4 GHz ISM frequency band.
  • The wireless personal area network (WPAN)
    technology is based on the Bluetooth
    specification.

6
Bluetooth wireless technology encompasses several
key points
  • Bluetooth is an open specification that is
    publicly available and royalty free.
  • Bluetooths short-range wireless capability
    allows peripheral devices to communicate over a
    single air-interface (used to communicate between
    a base and handset), replacing the cables that
    use connectors with a multitude of shapes, sizes
    and numbers of pins.

7
Bluetooth wireless technology encompasses several
key points
  • Bluetooth supports both voice and data, making it
    an ideal technology to enable many types of
    devices to communicate.
  • Bluetooth uses an unregulated frequency band
    available anywhere in the world.
  • Bluetooth allows large numbers of piconets
    (master device connected to seven slaves) to form
    a scatternet.

8
Scatternet
  • A scatternet is a group of independent and
    non-synchronized piconets that share at least one
    common Bluetooth device.
  • Bluetooth devices must have point-to-multipoint
    capability to engage in scatternet communication.
  • There may be a maximum of 10 fully loaded
    piconets in a scatternet.

9
Security is a huge concern
  • Hackers are using Bluetooth to attack mobile
    devices such as mobile phones, PDAs, laptops, and
    handsets.

10
Security concerns
  • There are a number of different types of attacks
  • -- attempts to steal data
  • -- service disruption
  • -- malware distribution

11
Bluejacking
  • Bluejacking exploits a Bluetooth devices ability
    to discover other nearby devices to send
    unsolicited messages.
  • The unsolicited message is then displayed on the
    victims device, potentially causing confusion or
    at least annoyance.

12
Bluesnarfing
  • Bluesnarfing is when the attacker connects to a
    device without the device owner being notified,
    and accesses local data.
  • Such local data can include potentially valuable
    information such as address books and calendars.

13
Bluebug Attack
  • A Bluebug Attack is when attackers are able to
    create a serial connection to the victim device
    and use this to control data services on the
    device.
  • This allows them to connect to data services,
    send and receive messages, and initial phone
    calls.

14
Minimizing the security risks
  • Immediately identify alert users to known
    vulnerabilities.
  • In an organization, avoid the use of unauthorized
    add-ons such as long-range transmitters.
  • Educate the staff to Bluesnarfing, Bluejacking,
    and Bluebug Attacks.

15
Minimizing the risks
  • Use caution when pairing devices.
  • The independence on PINs to create encrypted
    connection between devices is the only known
    significant vulnerability in the Bluetooth
    specification and are easy for hackers to
    discover.

16
Minimizing the risks
  • Look for products with control over Bluetooth.
  • Many PDAs feature a switch that lets users turn
    wireless on and off making it easier to turn off
    the wireless when not in use.

17
Minimizing the risks
  • Consider tools for identifying and mitigating
    security risks.
  • Deploy tools to both scan their environments for
    use of Bluetooth technologies as well as monitor
    managed endpoints for such device connections.

18
Conclusion
  • Bluetooth allows the individual to use and
    network convenient wireless devices. The
    technology is ingrained in society today. Caution
    should be used when securing any device using
    Bluetooth.

19
Use of Bluetooth within the Schools
  • Students can access information and communicate
    from anywhere in the building and on field trips
    by using hand-held devices using Bluetooth.
  • Allows the students to remain actively involved
    in the activity or learning experience.
  • Allows for easy download of data.
  • Allows for easy communication with other students
    and the teacher.

20
Works cited
  • Panko, Raymond R. (2005). Business data
    networks and telecommunications. Pearson
    Prentice Hall. Upper Saddle River, NJ, pp.
    242-243.
  • Hernacki, Brian. (2006). Improving bluetooth
    security What IT managers and mobile device
    users can do. Telecommunication and Network
    Security, pp. 39-42.
  • Youquan Zheng, Zhenming Feng. (2004).
    Simplification of the Bluetooth Radio Device.
    Networking today, pp. 108-115.
  • Technology Review. (2002). Automatic Networks
    Devices that connect themselves could change
    networking, pp. 20-21.
Write a Comment
User Comments (0)
About PowerShow.com