Security Technology can refer to three related but different things; Biometrics, Locksmithing and Perimeter Security. Biometrics allows organizations or individuals to assess identity of people in an automatic and reliable way. Unique and intrinsic biological, physical or behavioral traits are recognized and identity verified. Through these means access can be managed and controlled. Physical manifestations of biometrics include things that identify the shape of the body, including things like fingerprints, face recognition, DNA, palm prints, iris or/or retina recognition, and even an individual’s odor or scent.
Locksmithing denies or allows access based on overcoming the presence of a lock. This is an old method of security, as much as 4,000 years old and first devised by the Egyptians. The oldest known lock was found in the ancient palace of Emperor Sargon II, in Khorsabab. Its technology, that of a pin tumbler, is still used today by many modern locks.
Perimeter Security deals with denying or allowing access to a large area. Fences and alarms are often employed to maintain the security of a perimeter. Guards and guard dogs can also be used. On the internet a form of perimeter security is the presence of a firewall. This idea was first propounded in the 1994 book entitled, Firewalls and Internet Security: Repelling the Wily Hacker, written by William R. Cheswick and Steve Bellovin. This book defined the idea of a network firewall and described in much detail the main deployments of firewalls at a major company. This book had an enormous influence on the creation of the perimeter security model, which led the field of network security architecture in the middle of the 1990s.
Comments are closed.