Page 836 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 836
Some of the technologies listed in this table are labeled and marketed
as 4G while not actually meeting the technical requirements to be
classified as 4G. The International Telecommunications Union-Radio
communications sector (ITU-R) defined the requirements for 4G in
2008 but in 2010 acquiesced that carriers can call their noncompliant
technologies 4G as long as they lead to future compliant services. 5G
technologies are in development, and in 2018 a few test networks have
already been deployed.
There are a few key issues to keep in mind with regard to cell phone
wireless transmissions. First, not all cell phone traffic is voice; often
cell phone systems are used to transmit text and even computer data.
Second, communications over a cell phone provider’s network,
whether voice, text, or data, are not necessarily secure. Third, with
specific wireless-sniffing equipment, your cell phone transmissions
can be intercepted. In fact, your provider’s towers can be simulated to
conduct man-in-the-middle attacks. Fourth, using your cell phone
connectivity to access the internet or your office network provides
attackers with yet another potential avenue of attack, access, and
compromise. Many of these devices can potentially act as bridges,
creating unsecured access into your network.
Bluetooth (802.15)
Bluetooth, or IEEE 802.15, personal area networks (PANs) are
another area of wireless security concern. Headsets for cell phones,
mice, keyboards, Global Positioning System (GPS) devices, and many
other interface devices and peripherals are connected via Bluetooth.
Many of these connections are set up using a technique known as
pairing, where the primary device scans the 2.4 GHz radio frequencies
for available devices, and then, once a device is discovered, a four-digit
PIN is used to “authorize” the pairing. This process does reduce the
number of accidental pairings; however, a four-digit PIN is not secure
(not to mention that the default PIN is often 0000). In addition, there
are attacks against Bluetooth-enabled devices. One technique, known
as bluejacking, allows an attacker to transmit Short Message Service
(SMS)-like messages to your device. Bluesnarfing allows hackers to
connect with your Bluetooth devices without your knowledge and

