The IT Law Wiki
 
(2 intermediate revisions by the same user not shown)
Line 5: Line 5:
 
== Overview ==
 
== Overview ==
   
This publication seeks to assist organizations in understanding the risks of [[RFID]] technology and [[security]] measures to [[mitigate]] those [[risk]]s. It provides practical, real-world advice on how to initiate, design, [[implement]] and operate [[RFID]] [[system]]s in a manner that [[mitigate]]s [[security]] and [[privacy]] [[risk]]s. The document also provides background information on [[RFID]] [[application]]s, [[standard]]s, and [[system]] components to assist in the understanding of [[RFID]] [[security risk]]s and [[Security controls]].
+
This publication seeks to assist organizations in understanding the risks of [[RFID]] technology and [[security]] measures to [[mitigate]] those [[risk]]s. It provides practical, real-world advice on how to initiate, design, [[implement]] and operate [[RFID]] [[system]]s in a manner that [[mitigate]]s [[security]] and [[privacy]] [[risk]]s. The document also provides background information on [[RFID]] [[application]]s, [[standard]]s, and [[system]] components to assist in the understanding of [[RFID]] [[security risk]]s and [[security controls]].
   
 
This document presents [[information]] that is independent of particular [[hardware platform]]s, [[operating system]]s, and [[application]]s. The emphasis is on [[RFID]] [[system]]s that are based on industry and international [[standard]]s, although the existence of [[proprietary]] approaches is noted when they offer relevant [[security]] features not found in current [[standard]]s.
 
This document presents [[information]] that is independent of particular [[hardware platform]]s, [[operating system]]s, and [[application]]s. The emphasis is on [[RFID]] [[system]]s that are based on industry and international [[standard]]s, although the existence of [[proprietary]] approaches is noted when they offer relevant [[security]] features not found in current [[standard]]s.
  +
[[Category:Publication]]
  +
[[Category:RFID]]
  +
[[Category:Security]]
  +
[[Category:2007]]

Latest revision as of 04:53, 14 December 2017

Citation[]

NIST, Guidelines for Securing Radio Frequency Identification (RFID) Systems (NIST Special Publication 800-98) (Apr. 2007) (full-text).

Overview[]

This publication seeks to assist organizations in understanding the risks of RFID technology and security measures to mitigate those risks. It provides practical, real-world advice on how to initiate, design, implement and operate RFID systems in a manner that mitigates security and privacy risks. The document also provides background information on RFID applications, standards, and system components to assist in the understanding of RFID security risks and security controls.

This document presents information that is independent of particular hardware platforms, operating systems, and applications. The emphasis is on RFID systems that are based on industry and international standards, although the existence of proprietary approaches is noted when they offer relevant security features not found in current standards.