StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Mitigating RFID issues - Essay Example

Cite this document
Summary
This risk results in a range of improper or undesired activities like identification, positioning, tracking, corresponding, and disclosure of associated information (DeNoia…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97% of users find it useful
Mitigating RFID issues
Read Text Preview

Extract of sample "Mitigating RFID issues"

Running Head: MITIGATING RFID ISSUES MITIGATING RFID ISSUES By Mitigating RFID Issues The preliminary security risk is that unauthorized users will always attempt to capture RFID tags data. This risk results in a range of improper or undesired activities like identification, positioning, tracking, corresponding, and disclosure of associated information (DeNoia and Olsen, 2009, p. 213). I plan to minimize limitations and security issues for 1st and 2nd generation RFID tags through several measures based on these activities.i. I will reduce the distance between RFID tags and authorized users to lower the possibility of unauthorized users eavesdropping on exchanged communications (DeNoia and Olsen, 2009, p. 213). This measure also helps discern unauthorized from authorized users.ii. I will apply shielding in the form of a Faraday cage used explicitly around generation 1 and2 RFID tags or in a constrained environment wherein users can trade information using the tags (CoreRFID, 2009).iii. I plan to ensure the destruction of an RFID tag after serving its core purpose to prevent unauthorized users from abusing its user abilities and extract data from recorded communications (DeNoia and Olsen, 2009, p. 213).iv.

Concealing coding for communication between RFID tags and users can interrupt an unauthorized user’s attempts to extract data from exchanges between 1st and 2nd generation RFID tagsv. Encoding information stored on RFID tags or exchanged between a tag and its authorized user can inhibit unauthorized users from mining information from it (CoreRFID, 2009).vi. I plan to introduce noise into the using environment to lower the possibility of an unauthorized user differentiating the communications of a specific tag with its authorized user (DeNoia and Olsen, 2009, p. 213).vii.

I will employ authentication mechanisms that identify only authorized users with the use of easy passwords created using refined multi-factor methods (CoreRFID, 2009).ReferencesCoreRFID 2009, RFID & Privacy, CoreRFID, viewed 11 January 2015, http://www.corerfid.com/technology/TechnologyIssues/IssuesPrivacy.aspxDeNoia, LA and Olsen, AL 2009, ‘RFID and Application Security,’ Journal of Research and Practice in Information Technology, Vol. 41, No. 3, pp. 209-21.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Mitigating RFID issues Essay Example | Topics and Well Written Essays - 250 words”, n.d.)
Mitigating RFID issues Essay Example | Topics and Well Written Essays - 250 words. Retrieved from https://studentshare.org/information-technology/1673926-mitigating-rfid-issues
(Mitigating RFID Issues Essay Example | Topics and Well Written Essays - 250 Words)
Mitigating RFID Issues Essay Example | Topics and Well Written Essays - 250 Words. https://studentshare.org/information-technology/1673926-mitigating-rfid-issues.
“Mitigating RFID Issues Essay Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/information-technology/1673926-mitigating-rfid-issues.
  • Cited: 0 times

CHECK THESE SAMPLES OF Mitigating RFID issues

Security for Deploying Information Systems

Vulnerability is reported that may impose risks, bugs and errors, incompatibility issues, etc.... Consequently, there is a requirement of addressing security issues in an application to a relatively high degree.... For instance, analyzing all risks are addressed or not, level of compliance by classifying vulnerabilities and controls for mitigating threats....
9 Pages (2250 words) Essay

The Exeter Story's Organizational Structure

In this paper the author demonstrates how to avoid company loss, creating a firm organization wherein employees can work freely, equally delegated workload, smooth operation and harmonious work relationship among employees.... hellip; The Exeter Story organizational structure is separated into four departments with each having their own sub-departments and their own responsibilities to perform in the firm....
5 Pages (1250 words) Term Paper

Kuiper Leda Problem Solution and Defense

ssue and Opportunity IdentificationIssueOpportunityReference to Specific Course Concept (Include citation)ConceptKuiper Leda's main issues are the future growth of the company, & future growth of the company is depends on production, inventory, resources & order completion in timeTo keep the cost down proper inventory management & increased in production is required.... Kuiper decide to launch a new product knows as Radio Frequency Identification Devices (rfid)....
12 Pages (3000 words) Case Study

Obesity in the African American Community

For many first time visitors in the US, the culture and lifestyle are often very strange and even shocking, but few things are more surprising than the fact that meat tends to be considerably cheaper than vegetables.... In much of the rest of the world, the opposite is true with… This and many other factors have contributed to the increase in obesity in the US more so among low-income earners and even middle class working families with little However, over the last decade, statistics have shown that obesity is gradually becoming more pronounced among the black community (Pan et al....
4 Pages (1000 words) Research Paper

Practical Windows Security

The essay reveals the definition of security vulnerability and tells that it can be regarded as the preliminary filter that is applicable to various issues.... definition of security vulnerability can be regarded as the preliminary filter that is applicable to various issues....
9 Pages (2250 words) Essay

Tracking Technology

nbsp; Radio Frequency Identification (rfid) is applied in various instances.... rfid technology consists of a tag that has a transmitting antenna that can disburse and receive radio signals.... The technology is more efficient as compared to rfid as it can tell the exact position of an object/person from a wide range.... eofencing is a technology that uses rfid or GPS, and confines its reporting to a particular passive state....
5 Pages (1250 words) Essay

Specialized Automation in Manufacturing

The paper "Specialized Automation in Manufacturing" states that after describing rfid, the usability factors come in, which describes how rfid is used by the organizations and its significance in the domain of industrial engineering is demonstrated by different studies by the researchers.... Apart from the provision of advanced industrial engineering powered by Information Technology, rfid has also provided a contribution to the dedicated manufacturing division....
7 Pages (1750 words) Essay

Community Issues on Kangaroo Island Tourism: Kangaroo Islands Flinders Chase National Park

… The paper "Community issues on Kangaroo Island Tourism: Kangaroo Island's Flinders Chase National Park" is a wonderful example of a case study on tourism.... The paper "Community issues on Kangaroo Island Tourism: Kangaroo Island's Flinders Chase National Park" is a wonderful example of a case study on tourism.... All the above levels of community involvement among others in the tourism activities have resulted in the upsurge of community issues in diverse tourist destinations around the globe....
10 Pages (2500 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us