RFID Security
Frank Thornton, Chris Lanthem
- 出版商: Syngress Media
- 出版日期: 2006-04-01
- 定價: $1,700
- 售價: 6.0 折 $1,020
- 語言: 英文
- 頁數: 448
- 裝訂: Paperback
- ISBN: 1597490474
- ISBN-13: 9781597490474
-
相關分類:
RFID、資訊安全
立即出貨(限量) (庫存=1)
買這商品的人也買了...
-
$1,560$1,482 -
$1,200$1,176 -
$680$537 -
$1,730$1,644 -
$880$581 -
$650$553 -
$780$741 -
$780$702 -
$613Web Service Security: Scenarios, Patterns, and Implementation Guidance for Web Services Enhancements (WSE) 3.0
-
$1,068An Introduction to Formal Languages and Automata, 4/e
-
$650$507 -
$550$468 -
$980$774 -
$520$442 -
$750$593 -
$1,121Pattern Recognition, 3/e(IE)
-
$1,068Cryptography and Network Security, 4/e (IE) (美國版ISBN:0131873164) (平裝)
-
$720$569 -
$1,900$1,805 -
$880$616 -
$2,880$2,736 -
$580$452 -
$600$480 -
$720$612 -
$490$417
相關主題
商品描述
Description
Protect the Supply Chain
RFID Security reveals the motives of RFID hackers and then explains how to protect systems. Coverage includes how to prevent attackers from exploiting security breaches for monetary gain (hacking a store’s RFID system would allow a hacker to lower the pricing on any product); how to protect the supply chain (malicious/mischievous hackers can delete/alter/modify all identifying information for an entire shipment of products); and how to protect personal privacy (privacy advocates fear that RFID tags embedded in products, which continue to transmit information after leaving a store, will be used to track consumer habits).
Understand RFID Standards
Learn the various country, application, and vendor frequencies and classes of tags. Manipulate Tag Data
See how someone looking to steal multiple items could change the data on the tags attached to those items. Implement Security Measures
Understand the types of RFID attacks to see how someone might try to steal a single object or even try to prevent sales at a single store or chain of stores. Review Tag Encoding and Tag Application Attacks
Review man-in-the-middle attacks, as well as chip clones, tracking, and disruption attacks to RFID systems. Prevent Unauthorized Access
Ensure secure communications by deploying RFID middleware. Prevent Backend Communication Attacks
Prevent man-in-the-middle and TCP replay attacks on the backend. Assess the Risk and Vulnerability of Implementing RFID
Learn the questions to ask to determine the risks to your company.
商品描述(中文翻譯)
描述
RFID安全揭示了RFID黑客的動機,並解釋了如何保護系統。內容包括如何防止攻擊者利用安全漏洞獲取金錢利益(黑客可以破解商店的RFID系統,從而降低任何產品的價格);如何保護供應鏈(惡意/惡作劇的黑客可以刪除/修改整個貨物運輸的所有識別信息);以及如何保護個人隱私(隱私倡導者擔心嵌入產品中的RFID標籤在離開商店後仍然傳輸信息,將被用來追踪消費者習慣)。
了解RFID標準:了解各國、應用和供應商的頻率和標籤類別。
操作標籤數據:了解某人想要偷竊多個物品時如何更改附在這些物品上的標籤數據。
實施安全措施:了解各種RFID攻擊類型,以了解某人可能如何試圖偷竊單個物品,甚至試圖阻止單個商店或一連鎖商店的銷售。
審查標籤編碼和標籤應用攻擊:審查中間人攻擊,以及RFID系統的芯片克隆、追踪和干擾攻擊。
防止未經授權訪問:通過部署RFID中間件確保安全通信。
防止後端通信攻擊:防止中間人和TCP重放攻擊對後端的攻擊。
評估實施RFID的風險和漏洞:了解要詢問的問題,以確定對公司的風險。