Cena s DPH / bez DPH
Hlavní stránka>PD CEN/TR 16670:2014 Information technology. RFID threat and vulnerability analysis
sklademVydáno: 2014-06-30
PD CEN/TR 16670:2014 Information technology. RFID threat and vulnerability analysis

PD CEN/TR 16670:2014

Information technology. RFID threat and vulnerability analysis

Formát
Dostupnost
Cena a měna
Anglicky Zabezpečené PDF
K okamžitému stažení
9420 Kč
Čtěte normu po dobu 1 hodiny. Více informací v kategorii E-READING
Čtení normy
na 1 hodinu
942.00 Kč
Čtěte normu po dobu 24 hodin. Více informací v kategorii E-READING
Čtení normy
na 24 hodin
2826.00 Kč
Anglicky Tisk
Skladem
9420 Kč
Označení normy:PD CEN/TR 16670:2014
Počet stran:74
Vydáno:2014-06-30
ISBN:978 0 580 83895 8
Status:Standard
Popis

PD CEN/TR 16670:2014


This standard PD CEN/TR 16670:2014 Information technology. RFID threat and vulnerability analysis is classified in these ICS categories:
  • 35.240.60 IT applications in transport and trade

The scope of the Technical Report is to consider the threats and vulnerabilities associated with specific characteristics of RFID technology in a system comprising:

  • the air interface protocol covering all the common frequencies;

  • the tag including model variants within a technology;

  • the interrogator features for processing the air interface;

  • the interrogator interface to the application.

The Technical Report addresses specific RFID technologies as defined by their air interface specifications. The threats, vulnerabilities, and mitigating methods are presented as a toolkit, enabling the specific characteristics of the RFID technology being used in an application to be taken into consideration. While the focus is on specifications that are standardized, the feature analysis can also be applied to proprietary RFID technologies. This should be possible because some features are common to more than one standardized technology, and it should be possible to map these to proprietary technologies.

Although this Technical Report may be used by any operator, even for a small system, the technical details are better considered by others. In particular the document should be a tool used by RFID system integrators, to improve security aspects using a privacy by design approach. As such it is also highly relevant to operators that are not SME’s, and to industry bodies representing SME members.