RFID Security reveals the motives of RFID hackers and then explains how to protect systems. Coverage includes how to prevent attackers from exploiting security breaches for monetary gain (hacking a store’s RFID system would allow a hacker to lower the pricing on any product); how to protect the supply chain (malicious/mischievous hackers can delete/alter/modify all identifying information for an entire shipment of products); and how to protect personal privacy (privacy advocates fear that RFID tags embedded in products, which continue to transmit information after leaving a store, will be used to track consumer habits).
· Understand RFID Standards Learn the various country, application, and vendor frequencies and classes of tags.
· Manipulate Tag Data See how someone looking to steal multiple items could change the data on the tags attached to those items.
· Implement Security Measures Understand the types of RFID attacks to see how someone might try to steal a single object or even try to prevent sales at a single store or chain of stores.
· Review Tag Encoding and Tag Application Attacks Review man-in-the-middle attacks, as well as chip clones, tracking, and disruption attacks to RFID systems.
· Prevent Unauthorized Access Ensure secure communications by deploying RFID middleware.
· Prevent Backend Communication Attacks Prevent man-in-the-middle and TCP replay attacks on the backend.
· Assess the Risk and Vulnerability of Implementing RFID Learn the questions to ask to determine the risks to your company.
Table of Contents Ch. 1 What is RFID? 3 Ch. 2 RFID uses 29 Ch. 3 Threat and target identification 57 Ch. 4 RFID attacks : tag encoding attacks 67 Ch. 5 RFID attacks : tag application attacks 83 Ch. 6 RFID attacks : securing communications using RFID middleware 101 Ch. 7 RFID security : attacking the backend 153 Ch. 8 Management of RFID security 169 Ch. 9 Case study : using commerce events AdaptLink to secure the DOD supply network - leveraging the DOD RFID mandate 181
Product Details
* ISBN: 1597490474 |