Blackberry ENTERPRISE SOLUTION SECURITY - SECURITY FOR DEVICES WITH BLUETOOTH WIRELESS TECHNOLOGY - TECHNICAL Vue d'ensemble - Page 3
Parcourez en ligne ou téléchargez le pdf Vue d'ensemble pour {nom_de_la_catégorie} Blackberry ENTERPRISE SOLUTION SECURITY - SECURITY FOR DEVICES WITH BLUETOOTH WIRELESS TECHNOLOGY - TECHNICAL. Blackberry ENTERPRISE SOLUTION SECURITY - SECURITY FOR DEVICES WITH BLUETOOTH WIRELESS TECHNOLOGY - TECHNICAL 27 pages. Security technical overview
Contents
1 BlackBerry Enterprise Solution security........................................................................................................................
2 Bluetooth technology.........................................................................................................................................................
Bluetooth profiles........................................................................................................................................................................
Bluetooth profiles that BlackBerry devices support ..............................................................................................................
3 Risks of using Bluetooth technology on wireless devices..........................................................................................
Bluejacking...................................................................................................................................................................................
Bluesnarfing.................................................................................................................................................................................
Bluebugging.................................................................................................................................................................................
4 Managing Bluetooth enabled BlackBerry devices ......................................................................................................
Bluetooth technology security measures on BlackBerry devices.........................................................................................
Using IT policy to manage Bluetooth technology on BlackBerry devices..........................................................................
IT policy rules that control Bluetooth technology on BlackBerry devices......................................................................
Educating users about how to protect their Bluetooth enabled BlackBerry devices........................................................
5 Glossary................................................................................................................................................................................
6 Legal notice .........................................................................................................................................................................
3
5
5
5
7
7
7
8
9
9
11
11
20
21
23