Study Document

Data Security Using RFID Bands At Music Festivals Essay

Pages:5 (1616 words)

Sources:6

Subject:Technology

Topic:Data Security

Document Type:Essay

Document:#97930410


The radio frequency identification or RFID is the new technological method for quick identification of the user, especially if used for public events like music festivals. It makes data management easier, so that information about the attendees is managed technically by capturing data from scanners and transmitting it to the computer without the user's physical contact. This paper is about managing adult attendees at music festivals whose information would be stored in RFID wrist bands linked to their Twitter, Facebook, and credit/debit bank cards. The following sections would probe into its compliance issues and the related regulations that would impact the planned implementation.

Analysis

Description of the Chosen Use Case

RFID wrist bands would be used for managing adult attendees at a music festival at a hotel where bands would be linked to their Twitter and Facebook accounts and their bank credit/debit cards so that the buying of eatables is made hassle-free. There are various benefits to using this technology at large scale events since getting the attendees' entries is made quickly, which can be scanning 20 people per minute at the gate (Event Tribe, n.a.). The technology also gives an idea of how foot traffic at the event is taking place, which sections are popular, and which ones cannot attract any attendees. Unlike the traditional ticketing method, RFID bands would have a unique identification system linked with his social media profiles, thus, making it impossible for fraud and duplication. Taking out wallets from their pockets from time to time and paying for drinks and good would be trouble, but with RFID, there would be one simple tap, and buying would be done in a cashless manner.

There are chances that industry revenues increase with improved customer experience as time reduction and standing in line are eliminated from all the processes at the event and integration of social media activities with the attendees' check-in function, enabling the event's enhanced promotion value-added marketing potential.

Description of Five or More Types of Personal/Private Information Data That Will Be Collected, Stored, Processed With the Use Case

The type of data collected and stored on the RFID wrist bands would be attendees' Facebook and Twitter accounts and bank credit/debit cards. The name, address, credit card authorization, and identification information would be stored on the RFID bands so that when a purchase is made at the hotel, the information is quickly accessed with a beep of the band on the scanner, and waiting in lines would be eradicated from the process. The wrist bands are secured with a unique key to unlock the user profiles, such as social media profiles, that have an added benefit to be linked with the wristbands since the event's promotion would be done on the user's social media pages automatically when they mention in their check-ins. The identity cannot be stolen at RFID-enabled festivals since the transactions made with credit/debit cards are integrated within the computer system only accessed by the event organizers; the data sharing is optional as the third party cannot retrieve…

Some parts of this document are missing

Click here to view full document

…evidence.

· Technologies: Two categories of technological countermeasures can be implemented- cryptographic and non-cryptographic systems (Williamson et al., 2013). The cryptographic system is expensive but gives better safety chances when the tag functions in a locked or unlocked manner for the user's data protection. A key identification is generated, which is checked by the reader on the database; if the data corresponds, then the key unlocks allows full retrieval of the user's data. With non-cryptographic systems, rag killing is put to use, which is better for reducing security costs. The kill command is built within the tag so that when the user sends the code to make it ineffectual at the point of sale. Another security method is the utilization of tags that have read-writable memory.

· In case the wrist band is stolen or lost, the RFID function can be deactivated immediately so that unlawful use can be deterred. The linked accounts can be made invisible for any other user, and the event staff can be informed of taking further actions.

Closing Summary

RFID is undoubtedly an emerging and time-saving technology capable of handling user data for music festivals on a large scale. Security concerns have to be handled following the government rules and regulations to guarantee attendees' safety. Recommendations for this would include precautions in terms of people, processes, policies, and technologies. The attendees should secure their wristbands with passwords, firewalls should be installed for avoiding any potential cyber breach, hotel and event management policies should inhibit the staff from…


Sample Source(s) Used

References

Event Tribe. (n.a.). The top 10 benefits of using RFID for events. Retrieved from https://www.eventbrite.com/blog/academy/the-top-10-benefits-of-using-rfid-for-events/

ID&C. (n.a.). How to RFID wristbands work? Retrieved from https://www.idcband.com/blog/how-do-rfid-wristbands-work/

Kacicki, T. (2019, July 15). 4 commonly overlooked facts about RFID wristbands. Intellitix. Retrieved from https://intellitix.com/hub/four-commonly-overlooked-facts-rfid

OECD. (2008). OECD policy guideline on RFID. https://www.oecd.org/sti/ieconomy/40892347.pdf

Quirk, R.E. & Borrello, S.J. (2005). RFID: Rapid deployment and regulatory challenges. Retrieved from https://www.pharmamanufacturing.com/assets/Media/MediaManager/VenableRFIDpaper.pdf?SESSID=62935cf41f5a19909f5bb3ae3a598490

Williamson, A., Tsay, L., Kateeb, I.A. & Burton, L. (2013). Solutions for RFID smart tagged card security vulnerabilities. AASRI Procedia, 4, 282-287. DOI: 10.1016/j.aasri.2013.10.042

Cite this Document

Join thousands of other students and

"spark your studies".