Skip to Main Content
Today most businesses and many individuals depend on the integrity of computer systems and networks. However, transactions and data can be vulnerable to assaults from both casual and malicious sources. From denial-of-service attacks to identity theft, pranksters and predators can interfere with our lives. Security measures are essential and can take many forms, from biometrics and smart cards for user identification to defenses encoded in software and hardware components.
Note: The Institute of Electrical and Electronics Engineers, Incorporated is distributing this Article with permission of the International Business Machines Corporation (IBM) who is the exclusive owner. The recipient of this Article may not assign, sublicense, lease, rent or otherwise transfer, reproduce, prepare derivative works, publicly display or perform, or distribute the Article.