PPT : Bluetooth Network Security Seminar with Free Download
Published on April 25, 2016
Slide 1 :
WELCOME TO THE SEMINAR
Bluetooth Network Security
Slide 2 :
==> The modern age technology has many advantages and disadvantages.
==> The use of technology depends on the nature of the user, hence the scientists and engineers developed the devices and equipments as safe as possible for all.
==> This report includes the security threats and mindset behind the misuse of Bluetooth.
==> The introductory part of report told about the possible threats of wireless networking.
==> The basic knowledge about the Bluetooth is summarized in further pages.
Slide 3 :
==> Point to Point Link
==> Piconet Network
==> Ad-hoc or Scatternet Network
Slide 4 :
Slide 5 :
Security Modes In Bluetooth
==> Mode 1: Non-secure.
==> Mode 2: Service level security
==> Mode 3: Link level.
Slide 6 :
Establishing A Connection
==> The authentication process takes place only when a request to a service submitted.
==> The authentication process is summarized as; first, a connection request to L2CAP, and L2CAP request access from the security manager.
==> Then, the security manager looks in service and device DBs to determine if an authentication and encryption is needed or not.
==> After granting the access by the security manager L2CAP continue to set up a connection.
Slide 7 :
Attack Tools & Programs
==> Hardware Used: Dell XPS, Nokia N95, Nokia 6150, Hp IPAQ HX2790b.
==>Operating Systems: Ubuntu, Backtrack, Windows Vista, Symbian OS, windows mobile.
==>Software used: Bluebugger, Bluediving, Bluescanner, Bluesnarfer, BTscanner, Redfang, Blooover2, Ftp_bt.
==>Dell laptop with windows vista to be broken into and for scanning then with Linux to attempt attacks.
==>Pocket pc for being attacked, and one mobile for attacking one for being attacked.
Slide 8 :
==> The standard security method for Bluetooth is to simple have the device hidden or turned off and many devices require user input for any incoming message or connection.
==> This is surprisingly effective as when a device requires authentication for even a vcard it is difficult to find a way in without an unsecured channel.
==> The biggest security risk seems to be the users themselves several attacks succeeded simple because the users accepted the incoming connection
Slide 9 :
==> mail : firstname.lastname@example.org
More Seminar Topics:
Blue Brain Project Criticism,
Blue Brain Project 2015 2016,
Blue Brain PPT Free Download Presentation,
Blue Brain PDF Abstract,
Bio Battery Wikipedia 2016,
Bio Battery Turns Paper to Power,
Bio Battery Seminar Report,
Bio Battery PPT Free Download,
Bio Battery PDF Abstract,
Bio Battery Report,
GSM 900 Mobile Jammer Software,
Diamond Chip PDF,
Diamond Chip or Carbon Chip,
Diamond Chip Beads,
Diamond Chip Full Explanation