ExamGecko
Question list
Search
Search

Related questions

Question 1041 - CISA discussion

Report
Export

Which of the following should an IS auditor be MOST concerned with when a system uses RFID?

A.
privacy
Answers
A.
privacy
B.
Maintainability
Answers
B.
Maintainability
C.
Scalability
Answers
C.
Scalability
D.
Nonrepudiation
Answers
D.
Nonrepudiation
Suggested answer: A

Explanation:

RFID stands for Radio Frequency Identification, and it is a technology that uses radio waves to identify or track objects that have a small chip (RFID tag) attached to them. RFID tags can store various types of information, such as serial numbers, product codes, or personal data.RFID readers can scan the tags from a distance and access the information without physical contact1.

RFID has many benefits for different applications, such as inventory management, supply chain optimization, asset tracking, and access control. However, RFID also poses some challenges and risks for information security and privacy. Some of these risks are:

Privacy: RFID tags can be read by unauthorized or malicious parties, who can collect personal or sensitive data without the knowledge or consent of the tag owners.This can lead to identity theft, profiling, tracking, or surveillance2.For example, a hacker could scan an RFID-tagged passport or credit card and steal the personal information or financial details of the owner3.

Communication attacks: RFID systems are vulnerable to various types of attacks that target the wireless communication between the tags and the readers.These include eavesdropping, jamming, spoofing, replaying, cloning, or modifying the data transmitted by the tags or the readers4. For example, an attacker could intercept the data from an RFID tag and alter it before sending it to the reader, causing false or misleading information to be recorded.

Mafia fraud: This is a type of attack where an adversary acts as a man-in-the-middle and relays the information between two legitimate parties. This can allow the adversary to bypass authentication or authorization mechanisms and gain access to restricted areas or resources. For example, an attacker could use a device to relay the signal from an RFID-tagged car key to the car's ignition system and start the car without having the physical key.

asked 18/09/2024
Wasawatt Ch
39 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first