Bluetooth Vulnerabilities and Bluetooth Security Mechanisms
Bluetooth is a peer-to-peer network and communication technology and
usually lacks centralized administration, security policy and security enforcement
infrastructure.
Bluetooth can be susceptible to a
diverse set of security vulnerabilities including identity detection, location tracking, denial of service, unintended
control and access of data and voice channels, and unauthorized device control
and data access.
No comments:
Post a Comment