COMPUTER FUNDAMENTALS

COMPUTER NETWORKS AND COMMUNICATIONS

NETWORK DEVICES

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Which of the following is the unauthorized access of information from a Bluetooth device?
A
Bluejacking
B
Bluesnarfing
C
Deep Blue
D
The Blue Brothers
Explanation: 

Detailed explanation-1: -Bluesnarfing is a form of Bluetooth attack that takes advantage of a flaw in the Bluetooth protocol to get access to the device’s data without the owner’s knowledge or consent. The attacker can then take sensitive data like contact lists, text messages, and even internet access.

Detailed explanation-2: -Some bluesnarfing attackers use the victim’s phone to call long distance, leaving its owner with a huge telephone bill. All these happen without the victim’s knowledge, of course, and so attacks can go on for a long time.

Detailed explanation-3: -Bluebugging goes beyond bluejacking or bluesnarfing, allowing thieves to take full control of a device. A crafty bluebugger can wirelessly direct a mobile phone to make calls without the owner’s knowledge. Similarly, a bluebugger can set call forwarding and receive calls intended for the unsuspecting victim.

Detailed explanation-4: -If successful, bluesnarfing hackers can access important information on your device, including: Photos. Emails. Text messages.

There is 1 question to complete.