Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Attacker

Encyclopedia of Multimedia Technology and Networking, Second Edition
All types of persons who are able to destroy, change, or delete data on systems.
Published in Chapter:
RFID Technologies and Applications
Christian Kaspar (Georg-August-Universität Göttingen, Germany)
DOI: 10.4018/978-1-60566-014-1.ch167
Abstract
Radio frequency identification (RFID) is a radio-supported identification technology that typically operates by saving a serial number on a radio transponder that contains a microchip for data storage. Via radio waves, the coded information is communicated to a reading device (Jones et al., 2005). RFID does not represent a new development; it was devised by the American military in the 1940s. Since the technology’s clearance for civil use in 1977, RFID has been successfully used for the identification of productive livestock, for electronic immobilizer systems in vehicles, or for the surveillance of building entrances (Srivastava, 2005). Due to decreasing unit costs (especially for passive transponders), RFID technologies now seem increasingly applicable for the labeling of goods and semi-finished products. By this, manual or semi-automatic data entry, for instance through the use of barcodes, can be avoided. This closes the technical gap between the real world (characterized by the lack of distribution transparency of its objects) and the digital world (characterized by logically and physically unambiguous and therefore distribution-transparent objects). In addition, RFID facilitates fully automated simultaneous recognition of more than one transponder without direct line of sight between reader and transponders.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Internet of Things Application for Intelligent Cities: Security Risk Assessment Challenges
An entity, a person, or device that attempts to cause harm to an information system or results in a denial of existing service.
Full Text Chapter Download: US $37.50 Add to Cart
Auditing Defense against XSS Worms in Online Social Network-Based Web Applications
Any person who behaves in an incorrect manner. Attacker performs illegal activities on the Internet (i.e launches cyber-attacks) for his benefits like financial account hijacking for stealing money.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR