1 / 10

Near field Communications: Is it worth it?

Near field Communications: Is it worth it?. David Wynne. Systemanalyse und Programmentwicklung. System Analysis and Program Development. SAP. Founded in 1972 in Germany 5 former IBM employees Created their first financial accounting system within first year of operation

britain
Download Presentation

Near field Communications: Is it worth it?

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Near field Communications: Is it worth it? David Wynne

  2. Systemanalyse und Programmentwicklung • System Analysis and Program Development

  3. SAP • Founded in 1972 in Germany • 5 former IBM employees • Created their first financial accounting system within first year of operation • Throughout the years, became leader in the Information Technology field

  4. Smart Vending Machine Link to Article

  5. Capabilities of Vending Machine • Customers with NFC-enabled phones can link their credit card info and their social media accounts to the vending machine • This provides quick, efficient payment, and gives company an idea of consumers’ tastes and preferences

  6. Pros/Cons of Smart Vending Machine

  7. Security Risks with NFC technology • Vending Machine is stationary; an easy target for hackers • Third-Party Eaves-Dropping • Data Disruption/Corruption • Man-In-The-Middle Attacks

  8. Hackers • Without a secure channel that NFC transactions take place over, hackers can block, disrupt, corrupt, or steal data information being transferred without the two parties knowing

  9. Conclusion • Traditionally paid for with cash • If it’s not broke, don’t fix it • Why take a security risk for something so simple?

  10. References Boden, Rian. "SAP to put NFC in vending machines."NFCworld.com. NFC World, 09 Oct 2013. Web. 10 Oct 2013. <http://www.nfcworld.com/ 2013/10/09/326323/sap-put-nfc-vending-machines/>. Poole, Ian. "NFC Security." radio-electronics.com. Radio-Electronics. Web. 10 Nov 2013. <http://www.radio-electronics.com/info/ wireless/nfc/nfc-near-field-communications-security.php>. "1972-1981: the early years." global.sap.com. SAP. Web. 9 Nov 2013. <http://global.sap.com/corporate-en/our-company/ history/1972-1981.ep&xgt;. "2002-present: real-time data where and when you see it."global.sap.com. SAP. Web. 9 Nov 2013. <http://global.sap.com/corporate-en/our-company/history/ 2002-present.ep&xgt;.

More Related