Mitigation against Mobile Connectivity Security Attacks
Bluetooth:Bluetooth is a wireless technology that allows different devices to connect to one another and share data, such as ringtones or photos. Wireless signals transmitted with Bluetooth cover short distanes, typically 30 feet (10 meters).
Do’s:
- Use Bluetooth in hidden mode so that even if the device is using Bluetooth it is not visible to oth- ers.
- Change the name of the device to a different name to avoid recognition ofyour Mobile phone model.
- Put a password while pairing with other devices. The devices with the same password can connect to your computer
- Disable Bluetooth when it is not actively transmitting information.
- Use Bluetooth with temporary time limit after which it automatically disables so that the device is not available continuously for others.
Don’ts:
- Never allow unknown devices to connect through Bluetooth.
- Never switch on Bluetooth continuously.
- Never put Bluetooth in always discoverable mode.
Wi-Fi :
Wi-Fi
is short for “Wireless Fidelity.” Wi-Fi refers to wireless networking
technology that allows computers and other devices to communicate over a
wireless signal.
Many mobile
devices, video game systems, and other standalone devices also include
Wi-Fi capability, enabling them to connect to wireless networks. These
devices may be able to connect to the Internet using Wi-Fi.
Do’s:
- Connect only to the trusted networks.
- Use Wi-Fi only when required. It is advisable to switch off the service when not in use.
- Beware while connecting to public networks, as they may not be secure.
Don’ts:
- Never connect to unknown networks or untrusted networks.
No comments:
Post a Comment