Page 836 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 836

Some of the technologies listed in this table are labeled and marketed
               as 4G while not actually meeting the technical requirements to be
               classified as 4G. The International Telecommunications Union-Radio
               communications sector (ITU-R) defined the requirements for 4G in
               2008 but in 2010 acquiesced that carriers can call their noncompliant

               technologies 4G as long as they lead to future compliant services. 5G
               technologies are in development, and in 2018 a few test networks have
               already been deployed.

               There are a few key issues to keep in mind with regard to cell phone
               wireless transmissions. First, not all cell phone traffic is voice; often
               cell phone systems are used to transmit text and even computer data.
               Second, communications over a cell phone provider’s network,

               whether voice, text, or data, are not necessarily secure. Third, with
               specific wireless-sniffing equipment, your cell phone transmissions
               can be intercepted. In fact, your provider’s towers can be simulated to
               conduct man-in-the-middle attacks. Fourth, using your cell phone
               connectivity to access the internet or your office network provides
               attackers with yet another potential avenue of attack, access, and
               compromise. Many of these devices can potentially act as bridges,

               creating unsecured access into your network.


               Bluetooth (802.15)

               Bluetooth, or IEEE 802.15, personal area networks (PANs) are
               another area of wireless security concern. Headsets for cell phones,
               mice, keyboards, Global Positioning System (GPS) devices, and many
               other interface devices and peripherals are connected via Bluetooth.
               Many of these connections are set up using a technique known as

               pairing, where the primary device scans the 2.4 GHz radio frequencies
               for available devices, and then, once a device is discovered, a four-digit
               PIN is used to “authorize” the pairing. This process does reduce the
               number of accidental pairings; however, a four-digit PIN is not secure
               (not to mention that the default PIN is often 0000). In addition, there
               are attacks against Bluetooth-enabled devices. One technique, known

               as bluejacking, allows an attacker to transmit Short Message Service
               (SMS)-like messages to your device. Bluesnarfing allows hackers to
               connect with your Bluetooth devices without your knowledge and
   831   832   833   834   835   836   837   838   839   840   841