MSc computer system security 'RFID' - Essay Example

Comments (0) Cite this document
1. What is RFID? Radio Frequency Identification (RFID) is a technology to recognize objects. This technology is for eternity classified as a technology similar to Automatic Identification and Data Capture (AIDC). AIDC consists of Barcodes, Biometrics and Smartcards…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER95.3% of users find it useful
MSc computer system security RFID
Read TextPreview

Extract of sample "MSc computer system security 'RFID'"

Download file to see previous pages The prime advantage of RFID technology is its ease of use and minimalism. RFID replaces barcodes and is a time saving, effective and reliable alternative. That is the reason why it is adopted and deployed in multipurpose applications i.e. Supply Chain Management (SCM), Inventory Tracking, Theft Protection, Location based Services, Electronic Health Monitoring for health care systems, RFID integrated travel documents, payment systems and context-aware applications. In recent years, this technology is flourishing robustly due to its extensive usability in upcoming technologies i.e. Ubiquitous Computing, Pervasive Computing or Ambient Intelligence Solutions. RFID technology comprises of transmitters spreading electromagnetic technology in the environment to send and receive signals. The communication is conducted between two elements, transceiver and transponder. 2. Radio Frequency James Clerk formulated its principles in 19th Century [9]. The radio waves propagation is emitted the form of electromagnetic waves and promulgate in speed of light. The applications of radio waves consist of Radar systems, Fixed Mobile and Satellite Communication, Media Broadcasting and Computer Networks. Radio waves can utilize different band of frequencies measured in Hertz (Hz) which represents the natural process of oscillation in waves. RFID technology utilizes Low Frequency (LF), High Frequency (HF) and Ultra High Frequency (UHF) from the electromagnetic spectrum. Light waves have certain limitations when passing through objects. On the other hand radio waves travel through solid objects and opaque materials. The range of radio frequency waves which is currently used illustrates the following ranges; 30 KHz and 30 GHz [9]. Table 1 from [9] defines the bands in the electromagnetic spectrum. 3. Barcodes and RFID There is always a logical concept of analyzing RFID as a better substitute for the barcodes systems. However, the consideration of difference between these two technologies is imperative in order to deploy them successfully. Undeniably, RFID technology does not entail a line of sight to read the tags as compared to barcodes, where it is mandatory to identify the tag optically to scan it within a squat distance. Furthermore, in RFID technology, the space for data in a tag can be more than 100 bytes which is far greater than the maximum space available in barcodes. The available storage space provides the freedom to assign identification numbers not only to a brand but also to each item individually. The valuable functionality of identifying multiple tags concurrently enhances the efficiency in any operational environment employing this technology. On the other hand, RFID technology is prone in terms of attenuation and propagation problems hereditary from radio frequency, more specifically in the existence of metal or liquid. It is also a cheaper deployment as compared to barcode technology. Consequently, RFID industry stakeholders are working tirelessly to minimize the cost of RFID technology. The efforts are making the component prices lower, which are vital in calculating a cost of any RFID solution. As per the report in 2006, the RFID tag price will be around five cents [10]. 4. RFID Privacy and Security The protection related to privacy and security incorporated with RFID technology cannot be rectified without analyzing causes and driving factors. While ease of use and cost are the most significant factors, accumulation of ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“MSc computer system security 'RFID' Essay Example | Topics and Well Written Essays - 5000 words”, n.d.)
Retrieved from
(MSc Computer System Security 'RFID' Essay Example | Topics and Well Written Essays - 5000 Words)
“MSc Computer System Security 'RFID' Essay Example | Topics and Well Written Essays - 5000 Words”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF MSc computer system security 'RFID'

MSc computer system security 'Practical Windows Security'

...? Practical Windows Security Contents Introduction to windows security and vulnerabilities 3 The use of remote procedurecall 5 CVE- 2003-0352 7 Mitigating Factors 9 Security solutions 9 Conclusion 10 Reference List 12 Introduction to windows security and vulnerabilities A Windows system is prone to security threats once it is used as an internet server. The typical installation of the windows NT/2000 and other vulnerabilities makes it an easy target for attackers. This way computer networks are damaged on a regular basis. Although network security has improved and strengthened over time but so have the...
9 Pages(2250 words)Essay

Computer Security

...the basic design and deployment of computer systems, which form a major chunk of the issue. These misguided incentives begin with what economists call a moral hazard effect which resulted in a landslide of fraud. Other incentives include consumer’s lack of prioritizing on security measures which resulted in their minimum spending on software security. This is referred to by economists as ‘The tragedy of the commons’ with consumer’s unwilling to spend on measures that did not directly benefit them. Third is the failure in privacy and prolonged regulatory issues due to poor allocation of online risks. Last is the ability of these incentives to affect defense and offense...
3 Pages(750 words)Essay

Computer Security

...associated with security breaches according to cardholders, merchants, financial institutions, cost of breaches and compliance. In addition to that, it has discussed compliance issues and identified significant data breaches that have occurred in the US Retail Payment Industry. More importantly, it has recognized and discussed critical public policy related issues with an emphasis on data notification laws and the role of Federal Trade commission in tightening up security risks. The paper has also proposed a framework to upgrade the current system with the potential Chip and PIN based dynamic network procedure which will mitigate the risks associated with security...
3 Pages(750 words)Essay

Computer security

...?Assessment Computer Security Program Matriculation number Word Count: 1526 words Contents 3 Introduction 4 IdentifyingThreats and Vulnerabilities 4 Examination of the Security Principles Broken 4 Recommendations 5 References 7 Abstract Computer security refers to the minimization of vulnerabilities to assets and resources. There is no such thing has 100% security, although one can get close to it. The case study provides an example of how security lapses can occur and expose the system’s vulnerabilities. This paper looks into the threats and vulnerabilities that the event exposed and examines the...
6 Pages(1500 words)Essay

MSc Practical UNIX Security

...computers can be presented in many Personal Computer shops. Moreover, the relative simplicity of moving system applications among UNIX editions as well adds to a propagation of diverse OS kinds and versions, making the task of protecting similar organizations really difficult, for the reason that even though there are a lot of resemblances exist among the different Operating System kinds there as well a lot of differences. For instance, a system administrator can possess a lot of knowledge of one version of UNIX, managing one or more versions of UNIX can need extra information for offering similar quality of service as well as security...
8 Pages(2000 words)Essay

MSc Practical UNIX Security ''LDAP''

...and raising the Active directory domain functional level to Windows 2003. Moreover, for Linux / UNIX, ‘identity management module’ installation is required on the domain controller along with the configuration of NIS server. LDAP Account Management In order to manage account in the UNIX network environment, the Unix systems are configured with Microsoft Active directory for centralized management of user accounts. Moreover, it also solidify network security by integrating role based access and Kereberized authentication. Consequently, the operational cost is minimized, for the management of UNIX accounts. Moreover, UNIX contains various features for authentication and authorization. The authentication is...
8 Pages(2000 words)Essay

Computer Security

...personal information revelation behavior of millions of people to friends as well as complete strangers. Millions of people around the world use social networks like Friendster, MySpace, Facebook to communicate, find friends, dates and jobs – and in doing so they wittingly reveal highly personal information about themselves to everyone. With the burst in advertising of these social networks most of them now days encourage users to reveal highly personal information. This includes their dates of birth, cell phone numbers, addresses and highly confidential health information. The weak structural design of social networks in terms of security and access controls is cleverly concealed by a false sense of...
2 Pages(500 words)Essay

Computer Security

...are executed with a woefully inadequate strategy, considering a frighteningly short time horizon. In this research a proposal of an offensive defense comprising of a corporate partnership with successful cyber defense software companies to provide a united front against malware is of the highest preference. The initial capital investment of free anti-virus software to users would be offset in time by added security and stability. The key to which is integration of the social subsystem in order to execute such a strategy. Computer users’ basic lack of knowledge on the dangers that lie within the network system, such as the use of weak passwords or just trusting any e-mails sent to their...
30 Pages(7500 words)Essay

Computer system Network Security

...Network Security Network security is essential component as now-a-days information is computers are connected worldwide. Information is wealth for organisations. The computer systems are linked both internally and externally. The computers receive and send unlimited information2. Information lost is regarded as financial loss. As organisations are implementing paperless media and computerizing data the need for securing data at various stages become essential. Data is stored in various modes both online and offline1. The data stored online and offline opens up a threat by falling trap to potential hackers who intrude into our systems or network The issue of computer security first arose in the 1970s as individuals began to break... into...
5 Pages(1250 words)Essay

Computer security

...A Report on Computer security for Oracle Inc Report of the Topic The topic reports that computer security is an essential aspect that Oracle Corporation emphasizes to the users to enable them avoid cases of hacking. Oracle Corporation is the world’s principal software company for the database enhancement. The article is significant since it exposes aspects about hacking as a grave offense that can affect the reliability and status of an individual or an organization. In March 2011, Oracle experienced this crisis when its Website was hacked by Cernaianu Manole Razvan (Lennon, 2012). This made the users of the Website encounter difficulty in accessing data from their...
1 Pages(250 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic MSc computer system security 'RFID' for FREE!

Contact Us