The root problem in this case is that ABC Company’s RFID data can be stolen, manipulated, or even hacked. ABC Company uses RFID tags in a very secretive supply chain and on very important and expensive products. The data on ABC Company’s RFID tags contains very sensitive information that our competitors would love to get their hands on. One way for our competitors to get their hands on this information is to set up a rogue RFID reader. A rogue RFID reader could read ABC Company’s RFID tags and record all the information on them, including our confidential information (ThingMagic, n.d.). A rogue reader could also write new information onto our RFID tags or even kill the tag (ThingMagic, n.d.). Rogue and clone RFID tags also present a problem to RFID …show more content…
This solution could result in stolen, manipulated, or hacked data. The second solution to this problem is ensure that ABC Company’s network security is up to date and uses industry-standard network technology. The third solution is to have updated network security, use the latest technology and devices in RFID tagging and reading, and abstain from putting any confidential information on the RFID tag. The ideal solution in order to prevent stolen, manipulated, or hacked RFID data is to use the previous two solutions as well as use tag encryption and tag pseudonyms. Encryption would make the tags more complex and harder to clone, whereas pseudonyms would replace password-based RFID tags with changing serial numbers each time the RFID tag is read (ThingMagic, n.d.). RFID tags that use encryption have to have more storage and that means that they are more expensive than normal tags (ThingMagic,