ABSTRACT

Mobile computing technology has been one of the true revolutions of the early twenty-‚rst century. One of the most popular technologies within the mobile computing arena is Bluetooth technology, which allows di‰erent devices to connect to one other without complications such as having to manually synchronize them with each other. Like any other type of mobile technology, Bluetooth has a number of inherent security vulnerabilities that give rise to risks, some of which are potentially serious. Œis chapter explains the numerous vulnerabilities and risks in connection with Bluetooth technology and recommends control measures that can substantially reduce the level of associated risk. At the same time, however, some of Bluetooth’s built-in features combined with a limited range of Bluetooth-speci‚c technology controls are signi‚cant barriers to achieving desired risk levels. Administrative controls are thus in many respects the most e‰ective in controlling Bluetooth-related security risk.