Bluetooth Security

Contributed by Colleen Rhodes

Bluetooth provides a short range wireless communication between devices making it convenient for users and thus eliminating the need for messy cables. According to Bluetooth Special Interest Group (2006), “Bluetooth wireless technology is the most widely supported, versatile, and secure wireless standard on the market today.” Bluetooth operates in the open 2.4 GHz ISM band and is “now found in a vast array of products such as input devices, printers, medical devices, VoIP phones, whiteboards, and surveillance cameras. [However], the proliferation of these devices in the workplace exposes organizations to security risks.” (Detecting Bluetooth Security Vulnerabilities, 2005) This paper will explain what Bluetooth is, how it works, and some of the vulnerabilities and risks associated with it.

This document is in PDF format. To view it click here.

 

Rate this article: 
No votes yet