NFC Security Issues: A Case Study

NFC Security Issues: A Case Study Case Study example
Undergraduate
Case Study
Design & Technology
Pages 6 (1506 words)
Download 0
NFC Security issues: A case study Name: Institution: Introduction Near Field Communication technology is a form of technology that utilises the Smartphone technology in the enhancement of services such as contactless payments through pre-stored information in the credit cards…

Introduction

Particularly, this form of technology is quite popular in advanced nations such as Japan (Gordon & British Computer Society, 2007). However, according to various studies that have been conducted into the technology, especially in the UK by a team of researchers from Surrey University, an alarm is fast being raised about the security risks involved with the same, particularly with regard to the safety of private information of a client that is stored in it. This is because, the likely threats that arise are when the transmission for payments are made, which can be a few meters away from the payment terminal, may create a window of opportunity for someone to tap into the same and transmit that same private information to another phone for their own malicious use. In this paper, I seek to establish and discuss the various possible security risks associated with the use of NFC technology. This may include eavesdropping as slightly mentioned above, data or message corruption or modification, and interception or relay attacks. Another risk can be the physical theft of the Smart phones in order to gain access to the required passwords and credit card details. ...
Download paper
Not exactly what you need?

Related papers

Capstone and Case Studies in Energy Technology
Human Performance and Anatomy of an Event …
Security Technology
Security cameras are one aspect of business security that is commonly used across many different business types. Often a number of video cameras transmit their signals to a specific point, frequently a set of monitors. This system is known as closed-circuit television (CCTV) the name derives from the fact that although a television signal is produced it is not transmitted openly, and as a…
The Security Professional and their role in Emergency, Disaster and Contingency Planning
It also explains the measures and techniques that the security professional use to handle different emergencies or disasters. An emergency refers to an unforeseen combination of circumstances whose resulting states of nature require immediate attention and actions. An emergency may be serious to the extent that if no immediate attention is provided, it can result to crucial and fatal situations. A…
Technology Support System For Homeland Security Program
Former Senator Rudman views the department to be a needed “formulation” in spite of the existing of great Army, Marine Corps and Air Force (2003). However, in assessing the organization and mission of the DHS, this proposal sees the agency to be wanting in resources and capacity along the aspects of independent mobilization and focus of initiatives. Organizationally, the DHS has to correlate…
Data Governance, Quality, Integration, and Security
Although these aspects are closely interrelated within a system, addressing and improving them independently results in better performance of the system as a whole (Arens, Chee, Hsu & Knoblock, 1993). Data Governance Data governance encompasses a set of procedures ensuring that important assets in data form are properly managed in all divisions of an enterprise (Abiteboul, Benjelloun & Milo,…
Security Audit
Also, some team members violated integrity and confidentiality assertions by disclosing information to external parties. This paper entails the details and implications of security audit procedures carried out and observations noted. Conducting audit Lafleur has a complicated network of information systems in place, with various remote offices and centralized IT function. Therefore, to evaluate…
NFC: Detailed Introduction and Operation
The concept of ‘Internet of Thing’ is closely related to network ubiquity, which refers to identification, virtual connectivity and tracking of daily connection objects. This connectivity if the object and the virtual communication system have been enabled by the introduction of modern technology, particularly NFC (Near Field Communication), a device that is responsible for linking virtual…