O Preventing Validation Attacks

Follow normal physical security procedures. In the case of access cards or badges, the best system for preventing this type of attack is to train facility users to be alert to their surroundings and to report the presence of unknown individuals or any other unusual activities.

Systems used to control access should use a wide range of information as part of the validation program, including such things as current time, last access time, number of recent accesses, and so on, in order to determine unusual activity patterns, and should issue challenges to access attempts that fall outside established patterns.

Follow normal network security procedures. This type of attack depends on a combination of faults—a compromised RFID tag and a weakened access-control application. A compromised RFID tag can be counteracted with a strong, secure access-control application.

Was this article helpful?

0 0
The Ultimate Computer Repair Guide

The Ultimate Computer Repair Guide

Read how to maintain and repair any desktop and laptop computer. This Ebook has articles with photos and videos that show detailed step by step pc repair and maintenance procedures. There are many links to online videos that explain how you can build, maintain, speed up, clean, and repair your computer yourself. Put the money that you were going to pay the PC Tech in your own pocket.

Get My Free Ebook


Post a comment