Renting Is Being Cloned, Here Are Some Things To Consider When Using RFID-based Access Cards

Tuesday, 04 Jun 2024

Ensuring physical access security of a building is a crucial aspect that requires a layered approach to achieve maximum protection for everyone working inside. Various methods can be implemented, ranging from security guard supervision, CCTV camera installation, to advanced technologies such as biometric-based access control systems and access cards.

Each method has its own advantages and disadvantages, so a combination of several technologies is often needed to achieve the desired level of security. Among the various technologies available, the use of radio frequency identification (RFID) on access cards is most commonly chosen, but in fact, this technology is not without security risks.

According to the latest findings from Spentera, a leading cybersecurity company in Indonesia, 6 out of 7 buildings in Jakarta equipped with this system have the potential to be duplicated or cloned. Therefore, unauthorized parties still have the ability to duplicate or clone the RFID-embedded access cards.

Thanks to its convenience and efficiency in managing access, RFID is often used in buildings and facilities that prioritize privacy and security, including offices, data centers, server rooms, parking areas, and hotel rooms. However, in some cases, if access cards are successfully replicated, unauthorized parties can use them to steal goods or data, install harmful software or hardware, and pose a potential threat to individual security.

HannyHaliwela, Director of Research and Development at Spentera, emphasizes that safeguarding buildings from access card cloning threats is a shared responsibility that needs to be taken seriously. "Not only building management, but also companies that are tenants and the employees themselves share the responsibility of safeguarding security from access card duplication or cloning threats."

In addition, the general public, especially building workers, also play a crucial role in preventing potential attacks by adhering to the security procedures established by management and reporting any suspicious activities in the building environment.

Red Teaming as a Comprehensive Security Solution

To understand the security of the RFID system implemented as one of the Security perimeters, Spentera offers a comprehensive solution through the Red Teaming approach. Red Teaming is a comprehensive approach to testing the security of a system using various methods, including testing physical access using RFID.

Not only testing physical attacks, Red Teaming is a comprehensive method that covers various security aspects required by companies, ranging from testing physical attacks to cyber attacks. With Spentera's specialized Red Teaming services, companies can ensure that their systems are optimally protected from various threats, both physical and cyber.

In addition, Red Teaming also includes testing cyber attacks, including network penetration, application security, and simulation of resilience to phishing and social engineering attempts.

"With the Red Teaming approach, Spentera provides the opportunity to comprehensively test physical access involving RFID. This includes evaluating the potential for illegal access, direct inspection of critical and central facilities, and the implementation of strict environmental controls.




leave a comment
Comments are your responsibility according to the ITE Law.