Create a new account

It's simple, and free.

Personal Computer Security & Iris Technology

Today, organizations around the world depend on computers and other electronic devices to keep their operations running 24 hours a day, seven days a week. Businesses provide employees with computers the size of notebooks that have more processing power than the room-sized computers that controlled the Apollo moon program, and cellular phones ensure that no one ever needs to be truly unreachable. Unfortunately, the same devices that enable this 24/7 world also make businesses, governments and other institutions more vulnerable to sabotage and outright theft than at any time in the past. Thieves no longer have to be physically located within a building to gain access to sensitive information. The loss of information from the theft of a notebook computer from an airport waiting lounge can prove devastating. Business, government, and other institutions have long recognized the need to secure electronic devices both to protect against external theft and sabotage, and to prevent internal breaches of security. But always security effectiveness must be measured against its cost, ease of use, and the likelihood that it will be used. This research examines the importance of security authorization for electronic devices, evaluates common ways in which security is provided, introduces biometric security authentication, and provides an in-depth examination of iris technology as used with personal computers.

IMPORTANCE AND TYPES OF COMPUTER SECURITY

Loss of proprietary information is potentially far more damaging to organizations than loss of physical equipment, yet many organizations fail to take even rudimentary precautions against this threat. Companies which use modified bicycle chains to lash computers to workstations may require only a single password to gain access to the company network, and individuals may not be restricted as to which machines they have access.

Security breaches can go well beyond the theft of an entire la...

Page 1 of 13 Next >

More on Personal Computer Security & Iris Technology...

Loading...
APA     MLA     Chicago
Personal Computer Security & Iris Technology. (1969, December 31). In LotsofEssays.com. Retrieved 01:36, March 29, 2024, from https://www.lotsofessays.com/viewpaper/1696049.html