Vyjád?ení:
Many of the basic assumptions in the paper overlook a number of fundamental design features necessary in automatic data collection systems and good database design, says AIM Global president, Dan Mullen. In other words, the researchers built a system with a weakness and then proceeded to show how the weakness could be exploited. Not surprisingly, poor system design, whether capturing RFID tag information, bar code information or keyboard-entered data will create vulnerabilities.
Viz také:
The RFID Virus that Was not