Discussion Post
As with any other wireless technology, RFID is prone to security vulnerabilities. RFID tags can be counterfeited, spoofed, sniffed, and can even carry viruses that will infect RFID readers and their associated networks. Imagine that your organization has decided to adopt RFID tags to improve supply chain management. What are at least three methods that could be used to better secure the RFID tags?
The response should include a reference list. Double-space, using Times New Roman 12 pnt font, one-inch margins, and APA style of writing and citations.