32,99 €
inkl. MwSt.
Versandkostenfrei*
Versandfertig in 6-10 Tagen
payback
16 °P sammeln
  • Broschiertes Buch

In the last fifteen years or so, RFID and Contactless Smart Card technologies have been increasingly adopted in a number of industries such as Logistics, Retail, Facility Management, Law Enforcement and Transport. Reports of cyber security vulnerabilities and attacks on RFID and Contactless Smart Card systems; coupled with the fear of invasion in people privacy, have brought to the fore the issue of Information Security in these technologies. This book is an analysis of a number of existing RFID/Contactless Smart Card Applications and their vulnerabilities. For the first time, this book has…mehr

Produktbeschreibung
In the last fifteen years or so, RFID and Contactless Smart Card technologies have been increasingly adopted in a number of industries such as Logistics, Retail, Facility Management, Law Enforcement and Transport. Reports of cyber security vulnerabilities and attacks on RFID and Contactless Smart Card systems; coupled with the fear of invasion in people privacy, have brought to the fore the issue of Information Security in these technologies. This book is an analysis of a number of existing RFID/Contactless Smart Card Applications and their vulnerabilities. For the first time, this book has analysed these Applications with a very intelligent concept of Use Cases; developed a Threat Model and defined corresponding Security Requirements for each of the RFID/Contactless Smart Card Applications. In addition, this book has proposed a comprehensive Information Security Model based on the paradigm of defence-in-depth" for any RFID/Contactless Smart Card system. This analysis should be very useful to all Information Security professionals, Vendors, Integrators or anyone else who may be interested in these two exciting technologies.
Autorenporträt
Julien Shabani, MSc.: studied Information Security at Royal Holloway, University of London. Prior to this, Julien obtained a BEng. in Electrical Engineering with major in Electronic and Telecommunications Engineering at the University of Zambia.He is currently working as an independent Information Security Consultant in Zambia.