Why not encrypt all confidential, sensitive and borderline data? Why not use a fingerprint ID system as the private encryption key? Why not use a fingerprint and/or other unique identifier such as retinal or lens scan to ID your terminal to a computer? Why not use this method of identification to identify ALL info extracting and/or entering devices attached to system (s) that are to be protected?
Aucun commentaire:
Enregistrer un commentaire