logo

Increasing Security Breach and Solutions on RFID

   

Added on  2022-12-15

35 Pages5550 Words125 Views
Professional DevelopmentData Science and Big DataDisease and DisordersStatistics and Probability
 | 
 | 
 | 
Running head: INFORMATION TECHNOLOGY
Information
Technology
6/20/2019
Increasing Security Breach and Solutions on RFID_1

INFORMATION TECHNOLOGY 1
Abstract
A security breach is a type of incident that leads to unauthorized access of the services,
devices, data, applications, and/or networks bypassing the underlying security mechanisms. A
security breach takes place when an application or an individual illegally enter in the
confidential, unauthorized, or private logical Information Technology perimeter. The intent
of this paper is to discuss the increasing security breach in the environment and its impact. In
addition to this, the paper is also discussing the solutions on RFID that is Radio-Frequency
Identification.
Increasing Security Breach and Solutions on RFID_2

INFORMATION TECHNOLOGY 2
Table of Contents
Abstract......................................................................................................................................1
Chapter 1....................................................................................................................................3
Introduction................................................................................................................................3
1.1 Introduction..........................................................................................................................4
1.1 Research Objective...........................................................................................................4
1.2 Research Methods............................................................................................................4
1.3 Scope of Research............................................................................................................5
Chapter 2....................................................................................................................................6
Literature Review.......................................................................................................................6
2.1 Introduction..........................................................................................................................7
2.2 Conceptual Clarification..................................................................................................7
2.2.1 Security Breach.............................................................................................................7
2.2.2 RFID..............................................................................................................................7
2.2.3 RFID and its Applications.............................................................................................8
2.2.4 RFID Security Issues.....................................................................................................9
2.2.5 Proposed Solutions......................................................................................................10
Tag Deactivation..............................................................................................................10
User Intervention..............................................................................................................10
Encryption........................................................................................................................10
Tag passwords..................................................................................................................10
2.3 Literature Gap................................................................................................................10
2.4 Summary........................................................................................................................11
Chapter 3..................................................................................................................................12
Research Methodology.............................................................................................................12
3.1 Introduction........................................................................................................................13
3.2 Research Approach........................................................................................................13
3.3 Research Design.............................................................................................................13
3.4 Data Collection Method.................................................................................................14
3.5 Sampling Method...........................................................................................................15
3.6 Data Analysis Method....................................................................................................16
3.6 Research Limitations......................................................................................................16
Increasing Security Breach and Solutions on RFID_3

INFORMATION TECHNOLOGY 3
3.7 Ethical Consideration.....................................................................................................16
3.8 Summary........................................................................................................................17
Chapter 4..................................................................................................................................18
Analysis and Evaluation...........................................................................................................18
4.1 Survey Questionnaire.........................................................................................................19
4.2 Data Analysis.................................................................................................................21
4.3 Findings..........................................................................................................................25
Chapter 5..................................................................................................................................27
Conclusion and Recommendations..........................................................................................27
5.1 Conclusion and Recommendations....................................................................................28
5.2 Further Research............................................................................................................28
References................................................................................................................................30
Increasing Security Breach and Solutions on RFID_4

INFORMATION TECHNOLOGY 4
Chapter 1
Introduction
Increasing Security Breach and Solutions on RFID_5

INFORMATION TECHNOLOGY 5
1.1 Introduction
Identifying theft, hackers, stole credit data, viruses, and other different types of information
related to security threats have increased the concept of data security and also the awareness
of the public regarding this topic (Berezina, Miller and Kwansa, 2012). Maintaining the
security of the data is one of the most important issues of corporations, governments, and
individuals. Data security is said to be of the significant issue that possesses wide
implications for technology and business practices (Laube and Böhme, 2016).
The increasing acceptance of the Radio Frequency Identification technology that is RFID
results in opening doors for the data security and data threats measures. In broader terms,
RFID is comprised of a complete range of wireless devices of variable competences, power,
and complexity, including vehicle immobilizers, ExxonMobil SpeedPasses, Electronic
Product Code taps, etc. (Finkenzeller, 2010). RFID is comprised of small wireless devices
that produce exclusive identifiers upon examination by RFID readers, which produce
influential electromagnetic fields and “read” tag information. The RFID technology is present
in the industry from around 60 years and was introduced for enhancing the warfare
technologies. The initial application was introduced by Britain as IFF that is Identify Friend
or Foe system. This system was utilized to differentiate a friendly aircraft from the enemy
aircraft all through World War II.
1.1 Research Objective
The research is being presented with the objective to discuss the concept of a security breach
The research is also focusing on meeting the objective of identifying the solution to RFID.
Increasing Security Breach and Solutions on RFID_6

INFORMATION TECHNOLOGY 6
1.2 Research Methods
Research methods are the tools that are used by the research to conduct the research. These
methods could be either quantitative or qualitative or mixed. Quantitative methods are those
methods that evaluate the numerical data that mostly require statistical tools in order to
evaluate the gathered data (Taylor, Bogdan and DeVault, 2015). This enables the
measurement of variables and relationships between the variables. This kind of data could be
represented over tables and graphs. On the other side, qualitative data is a type of non-
numerical data and concentrated on establishing patterns.
To conduct this research, the researcher has adopted qualitative research under which
discussion has been made based on non-numerical data.
1.3 Scope of Research
This research over security breach and solution on RFID will increase the knowledge and
awareness regarding the security breach and possible solutions to reduce the risk of RFID.
This will enable people, organizations, and government to adopt different solutions programs
such that they could protect or safeguard their private and confidential information from
hackers.
Increasing Security Breach and Solutions on RFID_7

INFORMATION TECHNOLOGY 7
Chapter 2
Literature Review
Increasing Security Breach and Solutions on RFID_8

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
ELEC 30005 : Microwave communication systems
|24
|6013
|188

Working of RFID and NFC: Current Security Considerations and Challenges
|4
|662
|401

Communication And Information Technology docx.
|13
|2808
|22

RFID and Mobile Fusion for Authenticated ATM transaction
|111
|27574
|62

Radio-Frequency IDentification Report 2022
|17
|3887
|19

Implementation of IOT in Smart Transportation
|6
|4624
|210