This document provides info. to organizations on the security capabilities of Bluetooth and provide recommendations to organizations employing Bluetooth technologies on securing them effectively. It discusses Bluetooth technologies and security capabilities in technical detail. This document assumes that the readers have at least some operating system, wireless networking, and security knowledge. Because of the constantly changing nature of the wireless security industry and the threats and vulnerabilities to the technologies, readers are strongly encouraged to take advantage of other resources (including those listed in this document) for more current and detailed information. Illustrations.The typical four-digit PIN may be sufficient for low-risk situations; a longer PIN should be used for devices that require a higher level of security.7 3.2.2 Security Mode 4 Secure Simple Pairing (SSP) was introduced in Bluetooth v2.1 + EDR for anbsp;...
|Title||:||Guide to Bluetooth Security|
|Publisher||:||DIANE Publishing - 2009-05-01|