DocumentCode :
2946079
Title :
Managing Bluetooth risks in the workplace
Author :
Podhradsky, Ashley L. ; Casey, Cindy ; Ceretti, Peter
Author_Institution :
Drexel Univ., Philadelphia, PA, USA
fYear :
2012
fDate :
18-20 April 2012
Firstpage :
1
Lastpage :
9
Abstract :
Bluetooth technology (BT) and the inherent security vulnerabilities it introduces into business domains are often overlooked when security policies are developed. While organizations spend the lion´s share of their IT budgets on Intrusion Prevention/Detection Systems (IPS/IDS) to protect their wired networks and Virtual Private Network (VPN) technology to secure wireless data in motion (DIM), Bluetooth security is often disregarded. However, the International Data Corporation (IDC) projected that global Bluetooth short-wave wire semiconductor revenue will triple from $1.7 billion in 2007, to $3.3 billion by 2012 [1]. After a brief history of Bluetooth technology, researchers will examine how Bluetooth works, its vulnerabilities, and how these vulnerabilities can be exploited.
Keywords :
Bluetooth; computer network reliability; computer network security; risk management; virtual private networks; Bluetooth risk management; Bluetooth security; Bluetooth technology; DIM security; IDC; IPS-IDS; IT budgets; International Data Corporation; VPN technology; business domains; global Bluetooth short-wave wire semiconductor revenue; intrusion prevention-detection systems; security vulnerability; virtual private network; wired networks; wireless data-in-motion security; workplace; Bluetooth; Computer hacking; Peer to peer computing; Protocols; Wireless communication; Bluetooth; Cellular Phones; Honeypots; IT Security Policies; Network Forensics; Security; Wireless Technology;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Wireless Telecommunications Symposium (WTS), 2012
Conference_Location :
London
ISSN :
1934-5070
Print_ISBN :
978-1-4577-0579-3
Type :
conf
DOI :
10.1109/WTS.2012.6266076
Filename :
6266076
Link To Document :
بازگشت