
Average Reviews:

(More customer reviews)The remarkable thing about his book is its accessibility. The authors have done a good job illustrating technical concepts with straightforward explanations and everyday examples. By the end of the first chapter, I felt like an expert in the inner workings of RFID, even though I started with only the foggiest notions of how it all worked.
The reader will quickly understand the differences in RFID technologies used for various purposes like access cards for entering buildings, The SpeedPass keys at Shell stations, automated toll systems on the highways, or the electronic merchandise tags at Wal-Mart.
Just differentiating those technologies makes the book worthwhile. Then the second half takes the reader on the adventure of breaking and enhancing the security of RFID systems. RFID is fundamentally susceptible to min-in-the-middle attacks and cloning. In the information security world, those threats gave rise to technologies like firewalls, virtual private networks (VPNs), and intrusion detection systems (IDS). However in most of today's RFID deployments security is downright ignored. Even systems like door access controls - themselves designed for security purposes - suffer basic security flaws.
The last section of the book explores ways to secure RFID systems. This section gets a bit technical and may only be interesting to the most devoted security professional, but if you make it through to the end you'll have a solid understanding of when to use RFID, when to avoid it, and how to ensure the greatest value. (See full review at [...])
Click Here to see more reviews about: RFID Security
RFID (Radio Frequency Identification) is a method of remotely storing and receiving data using devices called RFID tags. RFID tags can be small adhesive stickers containing antennas that allow them to receive and respond to transmissions from RFID transmitters. RFID tags are used to identify and track everything from Exxon EZ passes to dogs to beer kegs to library books. RFID tags use a standard that has already been hacked by several researchers. There are several motives for someone wanting to hack an RFID system:
For monetary gain. Hacking a store's RFID system would allow a hacker to lower the pricing on any product(s). One could also steal cars (Prius or Lexus already have RFID keys) with RFID-encoded keys.
Wreak havoc with someone's supply chain. Malicous/mischievous hackers can delete/alter/modify all identifying information for an entire shipment of products.
Protect personal privacy. Privacy advocates fear that RFID tags embedded in products (which continue to transmit information after leaving a store) will be used to track consumer habits. RFID tags are also being tested as a means for identifying individuals on passports, driver's licenses, etc. This also has the ACLU types up in arms because, just like RFID tags in consumer products, these tags would be "always on" and broadcasting your personal information wherever you are.
0 comments:
Post a Comment