Bluetooth - Define Bluetooth and discuss different types of Bluetooth products. - Describe Bluetooth 5. Highlight implementations
Question:
- Define Bluetooth and discuss different types of Bluetooth products. - Describe Bluetooth 5. Highlight implementations of Bluetooth 5 and improvements over earlier generations. - Examine piconet as the primary type of Bluetooth network topology. Define the roles of master, slave, active slave, and parked slave. - Explain bluejacking and bluesnarfing attacks that can be used on Bluetooth technology.
Option 2) Near Field Communication (NFC)
- Define near field communication (NFC) including active and passive devices. - Describe the NFC communication process. - Review examples of NFC currently in use, emphasizing the use of NFC devices in contactless payment systems. - Discuss NFC risks and defenses that can be used to limit NFC attacks.
3) Radio Frequency Identification (RFID)
- Define RFID and its common usage scenarios. to include active and passive tags. - Describe the RFID communication process. - Review potential RFID attacks and potential mitigation efforts. - Discuss enhancements incorporated into Generation 2 RFID standards.
International Marketing And Export Management
ISBN: 9781292016924
8th Edition
Authors: Gerald Albaum , Alexander Josiassen , Edwin Duerr