Radio frequency identification (RFID) chips allow organizations to achieve a wide variety of business benefits. In this video, Mike Chapple explains how RFID works and the associated security risks.
- [Lecturer] Radio Frequency Identification,…or RFID chips, allow organizations to achieve a wide variety…of business benefits.…RFID works by embedding small chips…in a wide variety of devices.…You can see an example of an RFID chip here on the screen.…When an RFID chip comes in proximity of an RFID scanner,…the chip activates and sends information to the scanner.…There are many applications of RFID technology…in use today and RFID is widely used by both businesses…and consumers.…
In fact, you're probably using some…of this technology yourself.…Passports issued by many countries now contain RFID chips…that allow border agents to access digital information…about the passport holder.…You can tell if you have an RFID-enabled passport…because it will have this logo on the front cover.…Transit cards used by many cities use RFID technology,…as do many credit cards.…This speeds up transactions in busy environments.…You'll notice this symbol on RFID-enabled cards.…
It indicates that the card contains an RFID chip…and may be used with contactless readers.…
We are a CompTIA Content Publishing Partner. As such, we are able to offer CompTIA exam vouchers at a 10% discount. For more information on how to obtain this discount, please download these PDF instructions.
- Comparing viruses, worms, and Trojans
- Backdoors and logic bombs
- Understanding the attacker
- Attack types: from denial of service to brute force attacks
- Preventing insider threats
- Wireless attacks
- Understanding cross-site scripting
- Preventing SQL injection
- Social engineering
- Scanning for vulnerabilities
- Penetration testing
- Assessing the impact of vulnerabilities
Skill Level Beginner
2. Understanding Attackers
3. Understanding Attack Types
4. Wireless Attacks
5. Application Attacks
6. Social Engineering Attacks
7. Vulnerability Scanning and Penetration Testing
8. Impact of Vulnerabilities
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.