Presentation is loading. Please wait.

Presentation is loading. Please wait.

Bluetooth Presented by Venkateshwar R Gotur CMPT - 320.

Similar presentations


Presentation on theme: "Bluetooth Presented by Venkateshwar R Gotur CMPT - 320."— Presentation transcript:

1 Bluetooth Presented by Venkateshwar R Gotur CMPT - 320

2 AGENDA  Bluetooth Overview  Types of Bluetooth enabled devices and technology  Benefits of Bluetooth  Bluetooth Security, Vulnerabilities and Threads  Security Recommendations, Needs and Requirements.

3 Bluetooth Overview  Bluetooth was founded in 1998 by: Ericsson, Intel, IBM, Toshiba and Nokia  Created in order to promote, shape an define the specification and position Bluetooth in the market place  It name comes form the 10 th century Danish King Harald, who managed to unite Denmark and Norway

4 Continued…  Bluetooth is a radio technology used for exchanging data over short distances  Bluetooth is a standard and communication protocol primarily designed for low power consumption, with a short range based on low cost transceiver microchips in each device.  Used within the devices like cell phones, laptops and other wireless devices to communicate.

5

6 Bluetooth Technology  Short range (theoretically 10 –100m)  Point to point or point to multipoint  Wireless (ISM frequency band - 2.4GHz)  Voice and data transfer ( up to 1Mb/s)

7 Bluetooth Enabled Devices  Laptops  Headset  Printers  Keyboards  GPS  Cellular Phones and many more….

8 Benefits of Bluetooth  Cable replacement  Ease of File sharing  Wireless Synchronization  Internet Connectivity  Share capabilities

9 Bluetooth Vulnerability, Security and Threats  Bluesnarfing  Bluejacking  Bluebugging  Car Whisperer  Denial of Service  Fizzing Attacks  Pin Cracking  Bloover  Blue smack  Long distance snarf, etc

10 Bluesnarfing  Unauthorized access of information from a wireless device.  Loss of personal information.  Can rout out calls to his/her cell phones.  Works within the mechanism for exchanging business cards.  OBEX (object exchange).  Aims for discoverable and undiscoverable devices to be hacked based on brute force.

11 Continued…

12 Blue jacking  Attacked by sending unsolicited messages to a user of Bluetooth enabled devices.  Blue jack can create a phone book contact and write messages.  Pop up messages from the hacker  User can panic that his/her device is hacked.

13 Continued…

14 Bluebugging  Bluebugging goes well beyond bluesnurfing and bluejacking.  Allows hackers to completely takeover a Bluetooth device.  Blue bug has capabilities like bluesnarfing.  Bluebugger can pick up conversations in phone’s immediate area.  Bluebugger manipulates “backdoor” attacks and many more etc….

15 Continued…

16 Security recommendations, needs and requirements.  Disable Bluetooth, Turn off Bluetooth features when not in use.  Paring security: Bluetooth devices should be paired up in a private physical setting to minimize the risk of potential attack.  User should not respond to any messages requesting for a pin.  Pin for Bluetooth devices should be changed on regular intervals with at least eight characters alphanumeric.   Always Upgrade your devices to the latest technology.

17 Continued…  Do not pair up with other devices if you feel its unsecure.  Higher layer of encryption will also add an additional layer to security.  With increase in Bluetooth enabled devices the user should establish connection only with trusted devices.  Spatial distance can avoid other devices to gain access to your Bluetooth enabled device.

18 QUESTIONS QUESTIONS


Download ppt "Bluetooth Presented by Venkateshwar R Gotur CMPT - 320."

Similar presentations


Ads by Google