RFID Security
By Frank Thornton and Chris Lanthem
3/5
()
About this ebook
RFID tags use a standard that has already been hacked by several researchers. RFID Security discusses the motives for someone wanting to hack an RFID system and shows how to protect systems.
Coverage includes: security breaches for monetary gain (hacking a shops RFID system would allow a hacker to lower the pricing on any product products). How to protect the supply chain (malicous/mischievous hackers can delete/alter/modify all identifying information for an entire shipment of products). How to protect personal privacy (privacy advocates fear that RFID tags embedded in products, which continue to transmit information after leaving a store, will be used to track consumer habits).
The purpose of an RFID system is to enable data to be transmitted by a portable device, called a tag, which is read by an RFID reader and processed according to the needs of a particular application. The data transmitted by the tag may provide identification or location information, or specifics about the product tagged, such as price, colour, date of purchase, etc. .
* Deloitte & Touche expects over 10 billion RFID tags to be in circulation by the end of 2005
* Parties debating the security issue of RFID need information on the pros and cons of the technology and this is that information
* Little competition in a market desperate for information
Frank Thornton
Frank Thornton runs his own technology consulting firm, Blackthorn Systems, which specializes in information security and wireless networks. His specialties include wireless network architecture, design, and implementation, as well as network troubleshooting and optimization. An interest in amateur radio helped him bridge the gap between computers and wireless networks. Having learned at a young age which end of the soldering iron was hot, he has even been known to repair hardware on occasion. In addition to his computer and wireless interests, Frank was a law enforcement officer for many years. As a detective and forensics expert he has investigated approximately one hundred homicides and thousands of other crime scenes. Combining both professional interests, he was a member of the workgroup that established ANSI Standard "ANSI/NIST-CSL 1-1993 Data Format for the Interchange of Fingerprint Information."
Read more from Frank Thornton
Joe Grand's Best of Hardware, Wireless, and Game Console Hacking Rating: 5 out of 5 stars5/5WarDriving and Wireless Penetration Testing Rating: 5 out of 5 stars5/5Kismet Hacking Rating: 0 out of 5 stars0 ratings
Related to RFID Security
Related ebooks
RFID+ Study Guide and Practice Exams: Study Guide and Practice Exams Rating: 0 out of 5 stars0 ratingsWarDriving: Drive, Detect, Defend: A Guide to Wireless Security Rating: 3 out of 5 stars3/5Designing A Wireless Network Rating: 5 out of 5 stars5/5Stealing the Network: How to Own an Identity: How to Own an Identity Rating: 4 out of 5 stars4/5Combating Spyware in the Enterprise: Discover, Detect, and Eradicate the Internet's Greatest Threat Rating: 4 out of 5 stars4/5Snort Intrusion Detection and Prevention Toolkit Rating: 5 out of 5 stars5/5AVIEN Malware Defense Guide for the Enterprise Rating: 0 out of 5 stars0 ratingsSnort Intrusion Detection 2.0 Rating: 4 out of 5 stars4/5Hack the Stack: Using Snort and Ethereal to Master The 8 Layers of An Insecure Network Rating: 0 out of 5 stars0 ratingsHack Proofing Your Network Rating: 0 out of 5 stars0 ratingsHack Proofing Linux: A Guide to Open Source Security Rating: 5 out of 5 stars5/5Stealing The Network: How to Own the Box Rating: 4 out of 5 stars4/5Hack Proofing Your Identity In The Information Age Rating: 4 out of 5 stars4/5Cryptography for Developers Rating: 3 out of 5 stars3/5InfoSec Career Hacking: Sell Your Skillz, Not Your Soul Rating: 3 out of 5 stars3/5Dictionary of Information Security Rating: 0 out of 5 stars0 ratingsPerfect Password: Selection, Protection, Authentication Rating: 4 out of 5 stars4/5Chipless RFID based on RF Encoding Particle: Realization, Coding and Reading System Rating: 0 out of 5 stars0 ratingsThe RF in RFID: UHF RFID in Practice Rating: 0 out of 5 stars0 ratingsRadio Frequency Identification: The role of RFID in the emerging fields of Internet of Things and Internet of Nano Things Rating: 0 out of 5 stars0 ratingsHacking and Penetration Testing with Low Power Devices Rating: 2 out of 5 stars2/5Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research Rating: 0 out of 5 stars0 ratingsMeeting People via WiFi and Bluetooth Rating: 0 out of 5 stars0 ratingsRFID and Wireless Sensors Using Ultra-Wideband Technology Rating: 0 out of 5 stars0 ratingsIoT Security Complete Self-Assessment Guide Rating: 0 out of 5 stars0 ratingsStealing the Network: The Complete Series Collector's Edition, Final Chapter, and DVD Rating: 0 out of 5 stars0 ratingsMastering Malware Analysis: The complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks Rating: 0 out of 5 stars0 ratingsWireless Hacking: Projects for Wi-Fi Enthusiasts: Cut the cord and discover the world of wireless hacks! Rating: 5 out of 5 stars5/5Managed Code Rootkits: Hooking into Runtime Environments Rating: 5 out of 5 stars5/5
Security For You
CompTIA Network+ Review Guide: Exam N10-008 Rating: 0 out of 5 stars0 ratingsHacking For Dummies Rating: 4 out of 5 stars4/5Mike Meyers CompTIA Security+ Certification Passport, Sixth Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5CompTIA Security+ Certification Study Guide, Fourth Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Network+ Study Guide & Practice Exams Rating: 4 out of 5 stars4/5IAPP CIPP / US Certified Information Privacy Professional Study Guide Rating: 0 out of 5 stars0 ratingsWireless Hacking 101 Rating: 4 out of 5 stars4/5Cybersecurity For Dummies Rating: 4 out of 5 stars4/5How to Become Anonymous, Secure and Free Online Rating: 5 out of 5 stars5/5Make Your Smartphone 007 Smart Rating: 4 out of 5 stars4/5CompTIA Security+ Study Guide: Exam SY0-601 Rating: 5 out of 5 stars5/5Hacking : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Rating: 5 out of 5 stars5/5How to Hack Like a Pornstar Rating: 5 out of 5 stars5/5Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5CompTIA CySA+ Cybersecurity Analyst Certification Passport (Exam CS0-002) Rating: 5 out of 5 stars5/5Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry Rating: 4 out of 5 stars4/5Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5Social Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5Mike Meyers' CompTIA Security+ Certification Guide, Third Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5The Cyber Attack Survival Manual: Tools for Surviving Everything from Identity Theft to the Digital Apocalypse Rating: 0 out of 5 stars0 ratingsCompTIA CySA+ Practice Tests: Exam CS0-002 Rating: 0 out of 5 stars0 ratingsCompTIA Network+ Certification Guide (Exam N10-008): Unleash your full potential as a Network Administrator (English Edition) Rating: 0 out of 5 stars0 ratingsUltimate Guide for Being Anonymous: Hacking the Planet, #4 Rating: 5 out of 5 stars5/5Blockchain Basics: A Non-Technical Introduction in 25 Steps Rating: 5 out of 5 stars5/5The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers Rating: 4 out of 5 stars4/5
Reviews for RFID Security
1 rating0 reviews