SN-CEN/TR 16670:2014 PDF

SN-CEN/TR 16670:2014 PDF

Name:
SN-CEN/TR 16670:2014 PDF

Published Date:
06/04/2014

Status:
Active

Description:

Information technology — RFID threat and vulnerability analysis

Publisher:
Standards Norway SN-CEN/TR Series

Document status:
Active

Format:
Electronic (PDF)

Delivery time:
10 minutes

Delivery time (for Russian version):
200 business days

SKU:

Choose Document Language:
Need Help?
ADOPTED_FROM:CEN/TR 16670:2014 The scope of the Technical Report is to consider the threats and vulnerabilities associated with specific characteristics of RFID technology in a system comprising: — the air interface protocol covering all the common frequencies; — the tag including model variants within a technology; — the interrogator features for processing the air interface; — the interrogator interface to the application. The Technical Report addresses specific RFID technologies as defined by their air interface specifications. The threats, vulnerabilities, and mitigating methods are presented as a toolkit, enabling the specific characteristics of the RFID technology being used in an application to be taken into consideration. While the focus is on specifications that are standardized, the feature analysis can also be applied to proprietary RFID technologies. This should be possible because some features are common to more than one standardized technology, and it should be possible to map these to proprietary technologies. Although this Technical Report may be used by any operator, even for a small system, the technical details are better considered by others. In particular the document should be a tool used by RFID system integrators, to improve security aspects using a privacy by design approach. As such it is also highly relevant to operators that are not SME’s, and to industry bodies representing SME members. Although this Technical Report may be used by any operator, even for a small system, the technical details are better considered by others. In particular the document should be a tool used by RFID system integrators, to improve security aspects using a privacy by design approach. As such it is also highly relevant to operators that are not SME’s, and to industry bodies representing SME members.
Number of Pages : 76
Published : 06/04/2014

History


Related products


Best-Selling Products

UNE-ISO/IEC 14143-2:2009
Published Date: 02/04/2009
Information technology. Software measurement. Functional size measurement. Part 2: Conformity evaluation of software size measurement methods to ISO/IEC 14143-1:1998.
UNE-ISO/IEC 14598-1:2004
Published Date: 12/17/2004
Information technology -- Software product evaluation -- Part 1: General overview
UNE-ISO/IEC 14598-2:2004
Published Date: 12/17/2004
Software engineering -- Product evaluation -- Part 2: Planning and management
UNE-ISO/IEC 14598-3:2005
Published Date: 07/27/2005
Software engineering -- Product evaluation -- Part 3: Process for developers
UNE-ISO/IEC 14598-6:2007
Published Date: 12/12/2007
Software engineering. Product evaluation. Part 6: Documentation of evaluation modules. (ISO/IEC 14598-6:2001)
UNE-ISO/IEC 15939:2009
Published Date: 12/02/2009
Systems and software engineering. Measurement process