中英文文献翻译无线安全.docx

上传人:b****1 文档编号:512707 上传时间:2022-10-10 格式:DOCX 页数:10 大小:26.86KB
下载 相关 举报
中英文文献翻译无线安全.docx_第1页
第1页 / 共10页
中英文文献翻译无线安全.docx_第2页
第2页 / 共10页
中英文文献翻译无线安全.docx_第3页
第3页 / 共10页
中英文文献翻译无线安全.docx_第4页
第4页 / 共10页
中英文文献翻译无线安全.docx_第5页
第5页 / 共10页
点击查看更多>>
下载资源
资源描述

中英文文献翻译无线安全.docx

《中英文文献翻译无线安全.docx》由会员分享,可在线阅读,更多相关《中英文文献翻译无线安全.docx(10页珍藏版)》请在冰豆网上搜索。

中英文文献翻译无线安全.docx

中英文文献翻译无线安全

英文原文

WirelessSecurity

RichardBarber

RichardBarber,grouptechnicaladvisorofArticon-Integralislooks,attheevolutionoftele-and

data-communicationssystemsandassessesthepotentialadvantagesformobilesecurityofferedby

technologieslikeBluetooth

Security

Today'swirelessworldmeansthatdataisbeingsent,amongus,invisiblyfromdevicetodevice,countrytocountry,persontoperson. Thisdata,intheformofe-mails,photos,contactsandaddressesarepreciousandprivatetoeachofus. Thisprivateinformation,nolongermakingitswayalongwiresinplainsight,needstobesentsecurelytoitsintendedrecipientwithoutinterception. Wirelessstandardstheworldoverareevolvingandhavevariousformatsfordealingwiththesecurityissuesofitsusers. Bluetoothwirelesstechnologyisnoexception.

Bluetoothwirelesstechnologyhas,fromitsinception,putgreatemphasisonwirelesssecuritysothatusersofthisglobalstandardcanfeelsecurewhilemakingtheirconnections. TheBluetoothSpecialInterestGroup(SIG),madeupofover4000membermanufacturers,hasaBluetoothsecurityexpertsgroupmadeupofengineersfromitsmembercompanieswhoprovidecriticalsecurityinformationandfeedbackthatistakenintoaccount

astheBluetoothwirelessspecificationevolves.

ProductdevelopersthatuseBluetoothwirelesstechnologyintheirproductshaveseveraloptionsforimplementingsecurity. TherearethreemodesofsecurityforBluetoothaccess

betweentwodevices.

        SecurityMode1:

non-secure

        SecurityMode2:

servicelevelenforcedsecurity

        SecurityMode3:

linklevelenforcedsecurity

Themanufacturerofeachproductdeterminesthesesecuritymodes. Devicesandservicesalsohavedifferentsecuritylevels. Fordevices,therearetwolevels:

"trusteddevice"and"untrusteddevice."Atrusteddevice,havingbeenpairedwithone'sotherdevice,hasunrestrictedaccesstoallservices.Withregardtoservices,threesecuritylevelsaredefined:

servicesthatrequireauthorizationandauthentication,servicesthatrequireauthenticationonlyandservicesthatareopentoalldevices.

Lately,confusionandmisinformationsurroundingsecurityandBluetoothwirelesstechnologyhasincreased. Thecurrentsecurityissuestypicallyinvolvemobilephones. Howtheseissuesapplytootherclassesofdevicesisimportantandisoftennotaddressed. TheencryptionalgorithmintheBluetoothspecificationsissecure.ThisincludesdevicessuchasmiceandkeyboardsconnectingtoaPC,amobilephonesynchronizingwithaPC,andaPDAusingamobilephoneasamodemtonamejustafewofthemanyusecases.

Caseswheredatahasbeencompromisedonmobilephonesaretheresultofimplementationissuesonthatplatform. TheBluetoothSIGdiligentlyworkswithourmemberstoinvestigateanyissuesthatarereportedtounderstandtherootcauseoftheissue.Ifitisaspecificationissue,weworkwiththemembershiptogetpatchesoutandensurefuturedevicesdon'tsufferfromthesamevulnerability.Thisisanon-goingprocess.Therecentlyreportedissuesofadvanced"hackers"gainingaccesstoinformationstoredonselectmobilephonesusingBluetoothfunctionalityareduetoincorrectimplementation.Thenamesbluesnarfingandbluebugginghavebeengiventothesemethodsofillegalandimproperaccesstoinformation.Thequestionsandanswersbelowprovideuserswithmoreinformationaboutthesecurrentissuesandwilladdresstheirconcernsfordealingwiththesesecurityrisks.

Whatisbluejacking?

BluejackingallowsphoneuserstosendbusinesscardsanonymouslyusingBluetoothwirelesstechnology.BluejackingdoesNOTinvolvetheremovaloralterationofanydatafromthedevice.Thesebusinesscardsoftenhaveacleverorflirtatiousmessageratherthanthetypicalnameandphonenumber.Bluejackersoftenlookforthereceivingphonetopingortheusertoreact.Theythensendanother,morepersonalmessagetothatdevice.Onceagain,inordertocarryoutabluejacking,thesendingandreceivingdevicesmustbewithin10metersofoneanother.Phoneownerswhoreceivebluejackmessagesshouldrefusetoaddthecontactstotheiraddressbook.Devicesthataresetinnon-discoverablemodearenotsusceptibletobluejacking.

Whatisbluebugging?

BluebuggingallowsskilledindividualstoaccessthemobilephonecommandsusingBluetoothwirelesstechnologywithoutnotifyingoralertingthephone’suser.Thisvulnerabilityallowsthehackertoinitiatephonecalls,sendandreceivetextmessages,readandwritephonebookcontacts,eavesdroponphoneconversations,andconnecttotheInternet.Aswithalltheattacks,withoutspecializedequipment,thehackermustbewithina10meterrangeofthephone.Thisisaseparatevulnerabilityfrombluesnarfinganddoesnotaffectallofthesamephonesasbluesnarfing.

Whatisbluesna

展开阅读全文
相关资源
猜你喜欢
相关搜索
资源标签

当前位置:首页 > 解决方案 > 学习计划

copyright@ 2008-2022 冰豆网网站版权所有

经营许可证编号:鄂ICP备2022015515号-1