2.3 NFC, RFID, Infrared and Bluetooth Flashcards
What is NFC used for?
Tap-to-pay transactions and mobile wallets like Apple Pay and Google Pay.
What is the primary security risk with NFC?
Skimming and eavesdropping attacks.
How can NFC security be improved?
Enable NFC only when needed and use secure transaction apps.
What is RFID used for?
Inventory tracking and employee authentication badges.
What is a major security risk with RFID?
Signal interception and cloning attacks.
How can RFID security be improved?
Use two-factor authentication (e.g., RFID + PIN).
What is Infrared (IR) mainly used for?
Remote controls and line-of-sight communication.
Why is IR more secure than Bluetooth?
It requires direct line-of-sight, making interception harder.
What are the limitations of Infrared communication?
Short range and slow data transfer speeds.
What is Bluetooth commonly used for?
Wireless peripherals like headphones, keyboards, and smartwatches.
What is Bluejacking?
Sending unsolicited messages to a Bluetooth device.
What is Bluesnarfing?
Stealing data from Bluetooth-enabled devices.
What is the BlueBorne attack?
A Bluetooth vulnerability that allows full device control.
How can Bluetooth security be improved?
Disable discoverability and turn Bluetooth off when not in use.
What is tethering?
Sharing a smartphone’s internet connection via Wi-Fi, Bluetooth, or USB.
What are the main security risks of mobile hotspots and tethering?
Fake hotspots and data interception.
How can tethering security be improved?
Use only trusted hotspots and enable a VPN.
Which mobile connectivity technology is most commonly used for authentication badges?
RFID.
Which wireless technology uses direct line-of-sight for communication?
Infrared (IR).
What type of Bluetooth attack involves sending unsolicited messages?
Bluejacking.
What is a good security practice for using mobile hotspots?
Connect only to trusted hotspots and use a VPN.