Term
List the 4 bluetooth security expectations |
|
Definition
Easy to use and self-explanatory security configuration
Confidentiality protection
Authentication of connecting devices
Anonymity |
|
|
Term
What's mode 1 bluetooth security |
|
Definition
A BT unit never initiates any security procedures. (It does not demand authentication of encryption). |
|
|
Term
What's mode 2 bluetooth security |
|
Definition
Will not demand authentication or encryption at link establishment. Security controlled by L2CAP or connection establishment |
|
|
Term
|
Definition
Initiate security procedures before link setup is completed. Authentication OR Auth Plus Encryption |
|
|
Term
The Bluetooth security decides what mode to use based on what? |
|
Definition
The device with the highest security mode. |
|
|
Term
What are the three security modes for devices and services? |
|
Definition
Trusted - Unconditional access to all service Untrusted - Previously authenticated Unknown - No security information available |
|
|
Term
What are the three security levels for services? |
|
Definition
Auth AND authorisation Auth only Services open to all devices |
|
|
Term
3 Characteristics of security mode 1 (I know it's an annoying question but whatever!) |
|
Definition
Never send an auth challenge itself It has to respond to any auth presented to itself No encryption |
|
|
Term
Who/ what is responsible for requesting security in mode 2? |
|
Definition
The application or service |
|
|
Term
When is encryption / authentication setup? |
|
Definition
When the application or service asks for it |
|
|
Term
What is the advantage of security mode 2 over 3? |
|
Definition
|
|
Term
What is the advantage of mode 3 over 2? |
|
Definition
|
|
Term
What can handle mode 2 security? |
|
Definition
|
|
Term
When does mode 3 security use auth / enc? |
|
Definition
At the connection establishment |
|
|