Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 1

Title: What RFID Technology Means for Security Measures

A company should safeguard its internal and external security risks. They may verify individual
activities by mandating the usage of RFID tags to access certain resources, which can be helpful in
resolving an internal investigation. It will reduce security expenses since an RFID card allows you to
monitor access at all entry points in your facility without the need for a security crew at each door. This
saves a lot of money because having security people stationed at each door is expensive. It also grants
access to authorized personnel with a single swipe since comprehensive security checks take long time
to conduct which may hamper the company’s capacity to do its work.

Title: RFID holes create security concerns

RFID security flaws has been in news lately. But unlike email viruses and internet worms, this matter
doesn’t demand immediate concern in the IT department. RFID have brought an attention regarding its
vulnerability. A security expert cracked one of U.K’s new biometric passport by using RFID to store
personal data. This technology is said to be a RFID cloner that can steal codes from building access cards.
That being said, unlike threats that could affect a person using the web, the flaws that RFID possess
would only be truly dangerous if the information that it holds is truly valuable. RFID is physically small,
making it difficult to give them protection. The RFID tags are mobile, they can roam and therefore
exposed to unauthorized users. These concludes that every personnel responsible for designing an RFID
should understand what type of application it will support so they can choose appropriate security
controls.

Insert journal APA here:

Garretson, C. (2007, March 22). RFID holes create security concerns. Network World. Retrieved June 2,
2022, from https://www.networkworld.com/article/2296850/rfid-holes-create-security-concerns.html?
fbclid=IwAR19tUORK45J3wfaQTFy1TDGknWycMBOsfO1qATgm5FIMH2M3JTuH6dIHw4

You might also like