From the course: CompTIA Security+ (SY0-601) Cert Prep: 8 Network Security Design and Implementation
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Understanding Bluetooth and NFC attacks
From the course: CompTIA Security+ (SY0-601) Cert Prep: 8 Network Security Design and Implementation
Understanding Bluetooth and NFC attacks
- [Instructor] Today's smartphones use near-field communication technology for a wide variety of purposes. This short-range radio communication method allows the use of headsets, mobile payments, external speakers, keyboards, and all sorts of other uses. As with any technology however, the use of NFC communications provides attackers with another pathway to exploit security vulnerabilities. NFC communications cover very short ranges. They're designed to handle situations where devices are 30 to 50 feet apart. And Bluetooth is the most common NFC technology. And most people are familiar with the use of Bluetooth to connect smartphones to car audio systems, external speakers, and headsets. NFC communications are very useful but they can also be a source of security vulnerabilities. Bluejacking attacks occur when attackers use Bluetooth technology to send spam messages directly to a device. Typically they try to convince the…
Contents
-
-
-
-
-
-
-
-
-
(Locked)
Denial of service attacks4m 15s
-
(Locked)
Eavesdropping attacks4m 12s
-
(Locked)
DNS attacks3m 30s
-
(Locked)
Layer 2 attacks2m 3s
-
(Locked)
Network address spoofing3m 38s
-
(Locked)
Wireless attacks2m 59s
-
(Locked)
Propagation attacks4m 19s
-
(Locked)
Preventing rogues and evil twins2m 50s
-
(Locked)
Disassociation attacks2m 10s
-
(Locked)
Understanding Bluetooth and NFC attacks2m 2s
-
(Locked)
RFID security2m 25s
-
(Locked)
-
-
-