Security Issues Of Smart Card Technology

3524 Words15 Pages
Faculty of Computer Engineering & Science Module Name: Research Methods Module Code: CESCOM10227-7 Title of Research Paper: Security Issues in Smart Card Technology Student Name: Sathish Kotte Student Number: 12033769 Contents Introduction: 3 Topic Area of Proposed Study: 3 Intellectual Challenge: 4 Research Question: 5 Aims and Objectives: 5 Literature Review: 6 Research Methodology: 8 Research Design: 9 Research Approach: 10 Data Collection Methods 10 Secondary Research Methods 11 Primary Data Collection Methods: 11 Sample Selection Process: 11 Data Analysis: 12 Ethical Considerations: 13 Conclusion: 14 References: 15 Introduction: Topic Area of Proposed Study: The topic of the research study is related to smart…show more content…
Therefore, such features in the smartcards helps in meeting the changing needs of the applications as nowadays, there is an increased complexities, need for more security and functionality in the applications. In addition to this, smartcards are used in those applications which require strong and high quality security as it does not depend on external sources for ensuring security of different applications for which it is used (Mayes and Markantonakis 2007). In addition to this, the topic named security issues and vulnerabilities of smartcards is proposed for carrying out this research study as there is an increased popularity of the smartcards in different business organizations due to which attackers poses harm to the security aspects of the applications that are supported by the smartcard technology as it is used for providing security to such applications for the purpose of carrying out different activities smoothly and efficiently. In this context, the following research study concentrates on the security threats and vulnerabilities associated with smartcards and measures to be taken to reduce and eliminate it in order to improve the efficiency and usage of smartcard technology by different business organizations for carrying out different transactions in a secured manner (Pappu, Carvalho and Pardalos
Open Document