background image

Contents

1 BlackBerry Enterprise Solution security........................................................................................................................

3

2 Bluetooth technology.........................................................................................................................................................

5

Bluetooth profiles........................................................................................................................................................................

5

Bluetooth profiles that BlackBerry devices support ..............................................................................................................

5

3 Risks of using Bluetooth technology on wireless devices..........................................................................................

7

Bluejacking...................................................................................................................................................................................

7

Bluesnarfing.................................................................................................................................................................................

7

Bluebugging.................................................................................................................................................................................

8

4 Managing Bluetooth enabled BlackBerry devices ......................................................................................................

9

Bluetooth technology security measures on BlackBerry devices.........................................................................................

9

Using IT policy to manage Bluetooth technology on BlackBerry devices..........................................................................

11

IT policy rules that control Bluetooth technology on BlackBerry devices......................................................................

11

Educating users about how to protect their Bluetooth enabled BlackBerry devices........................................................

20

5 Glossary................................................................................................................................................................................

21

6 Legal notice .........................................................................................................................................................................

23

Summary of Contents for ENTERPRISE SOLUTION DEVICES TE

Page 1: ...Security Technical Overview BlackBerry Devices with Bluetooth Technology...

Page 2: ...SWDT391201 391201 0613044539 001...

Page 3: ...ejacking 7 Bluesnarfing 7 Bluebugging 8 4 Managing Bluetooth enabled BlackBerry devices 9 Bluetooth technology security measures on BlackBerry devices 9 Using IT policy to manage Bluetooth technology...

Page 4: ...Security Technical Overview BlackBerry Enterprise Solution security 2...

Page 5: ...ss solutions Criteria Description confidentiality TheBlackBerryEnterpriseSolutionusesencryptiontomakesurethatonlytheintended message recipients can view the contents of the message integrity The Black...

Page 6: ...Security Technical Overview Bluetooth technology 4...

Page 7: ...that BlackBerry devices support Bluetooth enabled BlackBerry devices currently support Bluetooth profiles and provide specific IT policy rules to control their use Profile Description A2DP This profi...

Page 8: ...he BlackBerry device from using this profile SPP This profile provides procedures that describe how to configure serial connections between a BlackBerry device and a Bluetooth enabled peripheral that...

Page 9: ...k when all of the following conditions are present The Bluetooth wireless transceiver is turned on The device is set to use discoverable visible mode The device is physically located within range of a...

Page 10: ...eventing users with malicious intent from using the OBEX implementation to access core BlackBerry device data Bluebugging Bluebugging is a device based threat that occurs when device manufacturers imp...

Page 11: ...sing CHAP authentication on all Bluetooth serial connections to computers flashing the LED light when connected to another Bluetooth enabled device prompting users to type their BlackBerry device pass...

Page 12: ...ecret key to complete a connection or pairing with another Bluetooth enabled device A user s passkey must be between one and 16 characters long and it is dependent on the target peripheral device User...

Page 13: ...es that control the use of Bluetooth wireless technology on BlackBerry devices are available in BlackBerry Enterprise Server version 4 0 and later These versions of the BlackBerry Enterprise Server su...

Page 14: ...h supported Bluetooth enabled devices Default setting The default setting is False Minimum requirements Java based BlackBerry device BlackBerry Device Software Version 4 1 BlackBerry Enterprise Server...

Page 15: ...logy is turned on when the BlackBerry device receives this IT policy rule the BlackBerry device must be reset for the change to take effect Minimum requirement Java based BlackBerry device BlackBerry...

Page 16: ...Mode IT policy rule Description This rule specifies whether to prevent BlackBerry device users from making their BlackBerry devices discoverable A BlackBerry device that is discoverable can be found...

Page 17: ...on 3 8 BlackBerry Enterprise Server Version 4 0 BlackBerry Connect Transport Stack Version 4 0 Exceptions The BlackBerry Enterprise Server for Novell GroupWise supports this IT policy rule in BlackBer...

Page 18: ...sed BlackBerry device BlackBerry Device Software Version 3 8 BlackBerry Enterprise Server Version 4 0 BlackBerry Connect Transport Stack Version 4 0 Exceptions The BlackBerry Enterprise Server for Nov...

Page 19: ...are Version 4 1 BlackBerry Enterprise Server Version 4 0 SP3 Force CHAP Authentication on Bluetooth Link IT Policy rule Description This rule specifies whether the BlackBerry device must use CHAP auth...

Page 20: ...bytes that the BlackBerry device uses to encrypt Bluetooth connections Default setting The default setting is 1 byte Minimum requirements Java based BlackBerry device BlackBerry Device Software Versio...

Page 21: ...lackBerry device password before the BlackBerry device can be discovered by Bluetooth enabled devices Default setting The default setting is False Dependencies The BlackBerry device uses this IT polic...

Page 22: ...th unknown Bluetooth enabled devices When pairing a BlackBerry device with another Bluetooth enabled device set the Discoverable option to 2 Minutes The BlackBerry device is discoverable for two minut...

Page 23: ...mote Control Profile DUN Dial up Networking GSM Global System for Mobile commmunications HFP Hands Free Profile HSP Headset Profile LED light emitting diode OBEX Object Exchange SIM Subscriber Identit...

Page 24: ...Security Technical Overview Legal notice 22...

Page 25: ...n that is contained in this documentation however RIM makes no commitment to provide any such changes updates enhancements or other additions to this documentation to you in a timely manner or at all...

Page 26: ...RVIVE A FUNDAMENTAL BREACH OR BREACHES OR THE FAILURE OF THE ESSENTIAL PURPOSE OF THIS AGREEMENT OR OF ANY REMEDY CONTAINED HEREIN AND B TO RIM AND ITS AFFILIATED COMPANIES THEIR SUCCESSORS ASSIGNS AG...

Page 27: ...TO SUPERSEDE ANY EXPRESS WRITTEN AGREEMENTS OR WARRANTIES PROVIDED BY RIM FOR PORTIONS OF ANY RIM PRODUCT OR SERVICE OTHER THAN THIS DOCUMENTATION Research In Motion Limited 295 Phillip Street Waterl...

Reviews: