2.3 NFC, RFID, Infrared and Bluetooth Flashcards
What is NFC used for?
Tap-to-pay transactions and mobile wallets like Apple Pay and Google Pay.
What is the primary security risk with NFC?
Skimming and eavesdropping attacks.
How can NFC security be improved?
Enable NFC only when needed and use secure transaction apps.
What is RFID used for?
Inventory tracking and employee authentication badges.
What is a major security risk with RFID?
Signal interception and cloning attacks.
How can RFID security be improved?
Use two-factor authentication (e.g., RFID + PIN).
What is Infrared (IR) mainly used for?
Remote controls and line-of-sight communication.
Why is IR more secure than Bluetooth?
It requires direct line-of-sight, making interception harder.
What are the limitations of Infrared communication?
Short range and slow data transfer speeds.
What is Bluetooth commonly used for?
Wireless peripherals like headphones, keyboards, and smartwatches.
What is Bluejacking?
Sending unsolicited messages to a Bluetooth device.
What is Bluesnarfing?
Stealing data from Bluetooth-enabled devices.
What is the BlueBorne attack?
A Bluetooth vulnerability that allows full device control.
How can Bluetooth security be improved?
Disable discoverability and turn Bluetooth off when not in use.
What is tethering?
Sharing a smartphone’s internet connection via Wi-Fi, Bluetooth, or USB.