Main Introduction Possibilities Ethics Physical Security Digital Security Bibliography

Digital Security


When dealing with information the digital defenses are very important. Today defenses have to deal with attacks from a variety of directions and of a variety of types. In order to keep systems secure a good deal of different software is put into place: IP Bounces, anonymous proxies, security servers, filters, and a variety of firewalls are all elements of computer security. Together these pieces of software form walls, layers, of security that can discourage hackers from even attempting a break-in. To make things even more secure many companies now employ a variety of identification methods, including but not limited to, fingerprints, voiceprints, and a variety of other biometric identification systems. Additionally, the tried and true identification methods, like passwords, still form a secure layer of security.