Title
Managing Bluetooth Risks In The Workplace
Abstract
Bluetooth technology (BT) and the inherent security vulnerabilities it introduces into business domains are often overlooked when security policies are developed. While organizations spend the lion's share of their IT budgets on Intrusion Prevention/Detection Systems (IPS/IDS) to protect their wired networks and Virtual Private Network (VPN) technology to secure wireless data in motion (DIM), Bluetooth security is often disregarded. However, the International Data Corporation (IDC) projected that global Bluetooth short-wave wire semiconductor revenue will triple from $1.7 billion in 2007, to $3.3 billion by 2012 [1]. After a brief history of Bluetooth technology, researchers will examine how Bluetooth works, its vulnerabilities, and how these vulnerabilities can be exploited.
Year
DOI
Venue
2012
10.1109/WTS.2012.6266076
2012 WIRELESS TELECOMMUNICATIONS SYMPOSIUM
Keywords
DocType
ISSN
Bluetooth, Honeypots, Cellular Phones, Security, Wireless Technology, Network Forensics, IT Security Policies
Conference
1934-5070
Citations 
PageRank 
References 
0
0.34
3
Authors
3
Name
Order
Citations
PageRank
Ashley L. Podhradsky122.42
Cindy Casey242.12
Peter Ceretti300.34