A financial institution is implementing an additional authentication layer to ensure that high-value transaction requests are only approved if initiated from within secure and verified premises. The IT department is tasked with defining a solution which can pinpoint the transaction initiation with high accuracy. Considering potential security measures, which authentication technology is most suitable for validating precise user location with the least likelihood of being spoofed?
RFID proximity technology
NFC (Near Field Communication)
|Threats, Vulnerabilities, and Mitigations
|Security Program Management and Oversight
|General Security Concepts