Research Report #2: Emerging Issues Risk Analysis and Report
Tracking systems that use barcodes have gained prominence due to their range of applications. One notable tracking system is the RFID system used as either a tag or chip. Through this system, it is possible to track the target audience in any engagement. The technology allows employees to locate items even when they are not within their sight. The Entertainment Team which is part of Resort Operations at Padgett-Beale can use a new management platform that supports an integration of the tracking system in dealing with its clients. A customized RFID band can be used by the organization to identify participants during the event and to also monitor their undertakings. Despite the cloud computing capabilities of the system, its use needs to receive the backing of the head of Corporate IT among other key stakeholders such as the Chief Finance Officer and the Chief Privacy Officer. For critical functionalities of the RFID technology like the cashless payment system, due diligence must be done to prove workability and to address cases related to security and privacy issues that are prone to occur while implementing the technology. This task provides a background research in the use of cashless purchases by individuals attending a music festival event where their IDs need to be checked to establish proof of age before they are allowed to have access to alcoholic beverages.
Analysis
The chosen case is using the wrist bands to manage adults who are attending a music festival. The bad will be linked to the social media platforms of the attendees to allow them access food, beverages and other souvenirs at the event (MyZone Media Inc, 2015). Through the RFID, the clients will have a service through a cashless system. Even with the impulse buying, the technology reduces possible theft as clients use wristband instead of carrying out cash. In the event of a stolen RFID wristband, the RFID system can be cancelled and be re-issued.
The RFID system is also linked to the user’s social media accounts and users can access them by simply tapping on the wristband against the RFID touch-point. Users can also share socially with their family and friends through free online advertising. The data that will be collected include client’s age, sex, food preferences, whether they use alcoholic drinks or not and preferences in the exhibition.
There are notable compliance issues while using the RFID bands, first is that clients need to be aware of what the bands seek to achieve to help promote integrity, second is the security risks of the wristband such as possible intrusion. The third compliance issue is the adherence to the Federal Communication Commission which calls on transparency. The fourth one is to display the contents of the RFID tag and lastly the ease of use.
Security and Privacy Issues that the Board need to Consider
A consideration of the security and privacy issues is key for the Board as it seeks to approve the implementation of the technology. The security and privacy issues are as outlined below.
RFID Sniffing
The organization needs to be concerned about the RFID sniffing which refers to the possibility of attackers using their RFID readers to access information from the user’s wristbands. Most of the RFID chips/tags may not differentiate between a request sent by a valid RFID reader and the other one which s fake a significant concern about guest privacy. The man in the middle attack makes the tag vulnerable and can be easily accessed by third parties. The attack often happens during the transmission of a signal like in eavesdropping where the hacker listens to a communication between a tag and a reader and thereafter, intercepts the information and possibly manipulates it. After diverting the original signal, the hacker can then send false data causing a wrong interpretation of information.
Denial of Service
Denial of service is described as an attack where authorized users are not given authority to access a given service. While sending or requesting to receive information send from an RFID, the reader and the backed server can end up being a target for denial-of-service attacks. In the event of such attacks, the RFID system may easily fail to make the correct identity verification as the reader and the RFID services will have been interrupted. In denial of service, the attackers can opt to jam the system with interferences such as noise, blocking of the radio signals or physically removing or disabling the RFID tags.
Viruses
The RFID system is prone to virus attacks just like is the case for other technology systems. The virus is likely to target the backed-up data base which is used to store all the important data of the clients. The virus data can be a great threat as it can partially or completely destroy the data to be used by the organization and other users. The Board should thus put in place remedial measures of how to avoid such security threats to the organization.
Having Counterfeit RFID
There is a possibility that attackers can come up with fake and manipulated RFID tags which are possibly prone to intrusion. Attackers can easily make counterfeit tags that can send wrong signals or wrongly link the data of clients with their identities. When attackers have access to this counterfeit RFID, data will no longer be encrypted and can be accessed by anyone. Hackers can use counterfeit tags to have access to exclusive deals or access areas that are exclusive to specific groups of people such as the VIP rooms as well as have backstage passes to exclusive areas. Furthermore, young people can also use the counterfeit RFID to get access to alcohol even when they age doesn’t qualify them to do so.
Best Practices/Implementation
Before Padgett-Beale implements the technology, there are notable security and privacy issues that need to be implemented as best practices. These best practices are as explored below.
Data Encryption
One way to ensure data is well protected is by ensuring that it is packaged in a manner only accessible or understood by the sender and the recipient. Through cryptography, it is possible to underscore when data was created, modified and finally sent to the recipient. Through encryption, the organization can easily maintain the integrity of the sensitive data being sent by ensuring that it is not accessible to unauthorized persons. The company must thus ensure the usage of tags that have encryption. Other security measures like monitoring of the flow of information and monitoring the users can ensure that data is used properly and by the right category of audience.
Consumer Transparency
Consumer transparency is an important ethical requirement that the organization should consider. As a best practice, the use of the RFID tag doesn’t have to be kept as a secret to the guest. Since the target population is adults, the guests need to be aware of the RFID tags and how such information will be used and stored (ID &C LLC 2018). It is critical that consumers understand how their information is being used and stored. To help reduce possible security and legal suits, the board must ensure that the clients understand what the tag has and what it serves to achieve.
Security
It is important for Padgett-Beale to have in place the appropriate cybersecurity measures that can help it to secure the RFID tags. The security measure also ensures that the readers protect the cards from unauthorized reading and tracking. Since the target audience are adults, the organization must also put in place security measures that can guarantee the security of linked information such as social media accounts from unauthorized access. By having a strong information security program, the organization can easily mitigate internal and external risks to guarantee the integrity of the stored information placed on the RFID tags.
Implement Security and Privacy Training Program
Training and sensitization programs are important for proper implementation of the RFID system. It is critical that all the operators of the system undertake a security and policy training before they are ready to use the system. In any security implementation, risks are mitigated best when all employees and stakeholders understand what is expected of them and are ready to comply to them without necessarily being compelled to do so (Brulia et al.,2009). Furthermore, the training program has to cover all the RFID privacy policy and also teach the operators how to properly implement the system through the set security measures.
Putting in Place a Privacy Policy
The process of implementing a privacy policy will dictate how the RFID system will store and eventually use the consumer’s confidential information. The RFID tags need to be designed to be more appealing. The system needs to have a data sharing and a data collection tool for ease of use. A privacy policy needs to be put in place before the implementation of the RFID system as this can help to determine the best security measures to implement (Karygiannis et al.,2017).
Conclusion
Generally, the RFID system has many sub-categories and with capabilities that are unique to addressing emerging security risks. The tool can be used for different reasons especially for event management where the activities of participants need to be monitored to ensure all the ethical and legal procedures are followed. The target population in this task were adult attendees at a Musical Festival and who has access to social media platforms. As demonstrated in this task, notable security concerns are prone to arise and hence the Padgett-Beale board should be aware of these security concerns and consequently establish the right measures towards addressing them. Some of the security recommendations made for the company include using data encryption, implementing security and network implementation, security and advocating for consumer transparency.
Research Report #2: Emerging Issues Risk Analysis and Report
Do you find yourself approaching a tight assignment deadline? We have a simple solution for you! Just complete our order form, providing your specific instructions. Rest assured that our team consists of professional writers who excel in their respective fields of study. They utilize extensive databases, top-notch online libraries, and up-to-date periodicals and journals to ensure the delivery of papers of the utmost quality, tailored to your requirements. Trust us when we say that thorough research is conducted for every essay, and our expertise in various topics is unparalleled. Furthermore, we have a diverse team of writers to cover a wide range of disciplines. Be assured that all our papers are created from scratch, guaranteeing originality and uniqueness.
Write my essays. We write papers from scratch and within your selected deadline. Just give clear instructions and your work is done


