Problem 1: Research and discuss and threat involving Bluetooth, bluejacking or bluesnarfing? Is Bluetooth vulnerable? Please discuss the answer.
Problem 2: WLAN security measures used to mitigate risks and vulnerabilities must align with an organization's business objectives and with the threats the organization faces. These measures range from basic considerations to affordable solutions to robust advanced security schemes. The typical Small Office/Home Office (SOHO) model typically features a single access point that supports several clients. What are the challenges of SOHO wireless networks?