RFID Tags and Optical Communication

Please use nothing from Gantham University

Network Systems Design

RFID Tags and Optical Communication

150 words each

Please respond to both of the following questions:

Question A

What are some of the everyday items where RFID tags are being used and what types of risks are users of these technologies accepting?

Question B

What is the earliest known use of light as a communication method and what are some of the common deployment architectures in use in today’s networks?

Class book

Vacca, J. (2014) Network and System Security, 2nd edition. Syngress

ISBN 978-0124166899

Read:

  • Chapter 12
  • Chapter 13

Lecture

Database Security

This week’s discussion of RFID security is a great segway into a lecture discussing the security of systems and applications that are often used in the background that users aren’t typically aware. RFID is one of those technologies that is widely used in commercial stores, but most shoppers have no idea that the products they are buying are electronically tracked through database systems to help control inventory numbers and for a variety of other methods. Because RFID often communicates with database systems, it’s important to consider some security features that should be implemented on these types of systems. That will be the focus of this week’s lecture. Databases have become a core component of corporate information technology infrastructure and this lecture will focus on security methodologies that can be deployed to protect these critical systems. Most major corporations currently have some form of database deployed on their networks that they use for virtually everything associated with their operation. These databases are used to store, to retrieve, and to manipulate data concerning employees, equipment, product offerings, customer purchases, and a wide array of other data types that have become crucial to everyday operations. Because of their critical nature, companies that deploy database systems should consider it a top priority to protect the systems and the data they contain. What we have found in the security realm is that we often provide common protections that people are familiar with, such as firewall and intrusion detection systems. We also tend to neglect application security or providing protection for core systems that house critical applications. Database systems are a great example of this. This week’s lecture will focus on some of the most protective measures that can be put in place. It is a deep discussion, so we won’t be able to cover every possible scenario. We can cover a few of the ideas that should be considered when working with these types of applications. As you go further into the world of computer security, you will find that many of the principles I am talking about apply to pretty much every type of system being used today.

For more information, please read the following articles:

  • Ming H., Jia N., & Shao Y. (2015). A novel multilayered RFID tagged cargo integrity assurance scheme. Sensors, 15(10), 27087-2711.
  • Wieczorek, A. (2015). RFID technology in transport. Proceedings of the Multidisciplinary Academic Conference, 1-7.

"Is this question part of your assignment? We can help"

ORDER NOW