R
Rack-mounted switches, 1070
Radiation imprinting, 375
Radio access network, 350
security in, 352
Radio frequency (RF), 371
Radio frequency identification (RFID), 304, 332, 340–341, 369, 633, 760b
applications, 372, 372t
challenges, 372–376
comparison of challenges, 375–376, 376t
counterfeiting, 373
DoS threats, 374b
insert attacks, 375
physical attacks, 375
replay attacks, 375
repudiation, 374–375
sniffing, 373
social issues, 375
spoofing, 374
tracking, 373
viruses, 375
devices, 1002
Guardian, 378
protections, 376–382
public key cryptography, 380–382
RFID system, 376–378
symmetric key cryptography, 378–380
reader, 369–371
standards, 371
system architecture, 369–371, 370f
back-end database, 371
radio frequency identification readers, 370–371 ...

Get Computer and Information Security Handbook, 3rd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.