Follow normal physical security procedures. Reading tag data requires equipment and physical proximity, and all unusual activities involving electronic equipment should be investigated. Individuals who might normally carry electronic equipment—utility or phone maintenance employees, for example—should be cleared by security personnel before they are allowed access to areas where RFID tags are in use.
In addition, limit the data contained in the tags to only what is absolutely necessary. Remember that it is unlikely the tags will remain under control throughout their lifecycle. Badges are lost, and price tags leave with the merchandise. Tags can be deactivated, but that is no guarantee the information contained on the tags cannot be recovered.
Follow normal network security procedures and ensure that the applications using RFID tags are themselves secure. Secure applications can limit the damage potentially caused by compromised RFID tags.
Was this article helpful?
Read how to maintain and repair any desktop and laptop computer. This Ebook has articles with photos and videos that show detailed step by step pc repair and maintenance procedures. There are many links to online videos that explain how you can build, maintain, speed up, clean, and repair your computer yourself. Put the money that you were going to pay the PC Tech in your own pocket.