5.77 MB | 3 files | DOC, PDF
This document provides an overview of Bluetooth technology and discusses related security concerns.
Bluetooth is an open standard for short-range radio frequency (RF) communication. Bluetooth technology is used primarily to establish wireless personal area networks (WPAN), commonly referred to as ad hoc or peer-to-peer (P2P) networks. Bluetooth technology has been integrated into many types of business and consumer devices, including cellular phones, personal digital assistants (PDA), laptops, automobiles, printers and headsets. This allows users to form ad hoc networks between a wide variety of devices to transfer voice and data. This document provides an overview of Bluetooth technology and discusses related security concerns.
The attached Zip file includes:
Cryptography provides three crucial types of data protection: integrity, confidentiality and source identification.... More >>
Determine if data encryption is a fit for the company's critical information.... More >>
Ensure the overall integrity of your network infrastructure by practicing sound forensic techniques.... More >>