In recent years we as a race have become overly dependent on technology, which has forced us to develop electronic devices that allow us to transfer and share data more quickly and securely. However, this task of connecting different technologies has not been painless as most devices come with different operating systems, parts, connectors and protocols that need to be considered and taken care of before developing new devices. As a result, it has been a challenge to produce new technologies and protocols to allow these devices to connect easily. One such solution is Bluetooth which allows devices to connect wirelessly over a short distance. However, like any other wireless network, Bluetooth is also prone to various types of hacking. What is Bluetooth? Bluetooth is a device that uses radio communication to wirelessly connect electronic devices such as cell phones, laptops, and portable devices to connect to each other and also over the Internet. According to Wikipedia.org “the communication distance varies from approximately 1 meter to a maximum of 100 meters”. This suggests that the network is created using low-power radio waves. Devices using Bluetooth are capable of transferring data at a speed of 1 Mbps. Bluetooth technology was created to replace cable networks and establish short-range communications. How does Bluetooth work? Standard Bluetooth technology uses radio waves to create a wireless network between devices. To do this, a Bluetooth chip is inserted into the consumer's electronic device and peripherals to communicate with each other at a special frequency. The chip consists of a transmitter and a receiver known as a transceiver. The transmitter chip transmits data via...... paper ......and in the form of business cards. Rob Schneirderman in his article on communications security very rightly points out that “more than 20 million portable PDAs and a billion cell phones are in use today, yet few companies have security policies in place to administer the use and protection of their wireless data”. Bluetooth is a wireless technology that is prone to numerous flaws and security issues, but if used carefully it can truly be beneficial to the world of IT and users in general. Users concerned about security will have to give up some conveniences to ensure they receive safe data. Bluetooth device manufacturers increasingly understand the balance between security and convenience and are trying to design their devices in a way that encourages users to be more secure about the information they receive and send through their device..
tags