Professional Documents
Culture Documents
RRL Thesis 2
RRL Thesis 2
A company should safeguard its internal and external security risks. They may verify individual
activities by mandating the usage of RFID tags to access certain resources, which can be helpful in
resolving an internal investigation. It will reduce security expenses since an RFID card allows you to
monitor access at all entry points in your facility without the need for a security crew at each door. This
saves a lot of money because having security people stationed at each door is expensive. It also grants
access to authorized personnel with a single swipe since comprehensive security checks take long time
to conduct which may hamper the company’s capacity to do its work.
RFID security flaws has been in news lately. But unlike email viruses and internet worms, this matter
doesn’t demand immediate concern in the IT department. RFID have brought an attention regarding its
vulnerability. A security expert cracked one of U.K’s new biometric passport by using RFID to store
personal data. This technology is said to be a RFID cloner that can steal codes from building access cards.
That being said, unlike threats that could affect a person using the web, the flaws that RFID possess
would only be truly dangerous if the information that it holds is truly valuable. RFID is physically small,
making it difficult to give them protection. The RFID tags are mobile, they can roam and therefore
exposed to unauthorized users. These concludes that every personnel responsible for designing an RFID
should understand what type of application it will support so they can choose appropriate security
controls.
Garretson, C. (2007, March 22). RFID holes create security concerns. Network World. Retrieved June 2,
2022, from https://www.networkworld.com/article/2296850/rfid-holes-create-security-concerns.html?
fbclid=IwAR19tUORK45J3wfaQTFy1TDGknWycMBOsfO1qATgm5FIMH2M3JTuH6dIHw4