Investigate security technology

Security technologies

  1. PIN number - Personal Identification Number. It is a numeric password shared between a user and a system, that can be used to verify the user to the system.

    Legislation - The act of making or enacting laws.

    Biometric scanners - Biometric are methods of recognizing a person based on a physiological or behavioral characteristic like finger print.

    Encryption - This is the most effective way to achieve data security. To read an encrypted file, you must have access to a secret key or password that enables you to decrypt it.

    Forensic computing - Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a court of law.

Chick-Fil-A (fast food restaurant) got exposed

KrebsOnSecurity first began hearing from banks about possible compromised payment systems at Chick-fil-A establishments in November, but the reports were spotty at best. Then, just before Christmas, one of the major credit card associations issued an alert to several financial institutions about a breach at an unnamed retailer that lasted between Dec. 2, 2013 and Sept. 30, 2014.