Page 837 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 837

extract information from them. This form of attack can offer attackers
               access to your contact lists, your data, and even your conversations.

               Bluebugging is an attack that grants hackers remote control over the
               feature and functions of a Bluetooth device. This could include the
               ability to turn on the microphone to use the phone as an audio bug.
               Fortunately, Bluetooth typically has a limited range of 30 feet, but
               some devices can function from more than 100 meters away.
               Bluetooth radios and antennas are classified by their maximum
               permitted power. The classes are shown in Table 11.11.


               TABLE 11.11 Classes of Bluetooth devices


                         Class Maximum permitted power Typical range
                         1         100 mW                                     100 m

                         2         2.5 mW                                     10 m

                         3         1 mW                                       1 m

                         4         .5 mW                                      .5 m

               Bluetooth devices sometimes employ encryption, but it is not dynamic
               and can usually be cracked with modest effort. Use Bluetooth for those

               activities that are not sensitive or confidential. Whenever possible,
               change the default PINs on your devices. Do not leave your devices in
               discovery mode, and always turn off Bluetooth when it’s not in active
               use.


               RFID

               Radio Frequency Identification (RFID) is a tracking technology based
               on the ability to power a radio transmitter using current generated in

               an antenna when placed in a magnetic field. RFID can be
               triggered/powered and read from a considerable distance away (often
               hundreds of meters). RFID can be attached to devices or integrated
               into their structure, such as notebook computers, tablets, routers,
               switches, USB flash drives, portable hard drives, and so on. This can
               allow for quick inventory tracking without having to be in direct

               physical proximity of the device. Simply walking into a room with an
               RFID reader can collect the information transmitted by the activated
               chips in the area.
   832   833   834   835   836   837   838   839   840   841   842