Security Technologies
PIN, Legislation, Forensic computing and more
PIN
PIN, (as you may have known or not), stands for Personal Identification Number, it is made up of 4 numbers, these 4 numbers can consist out of these 10 other numbers: 1, 2, 3, 4, 5, 6, 7, 8, 9 and 0. There can be a total of 10000 combinations! Generally these PIN codes are used with banking systems, so that the user will have a unique 16-digit card and they will need to put it into an ATM, once it is in there, they will need to put in their 4-digit PIN code, so that they get the money that they have asked for. That is ones of the most common reason why PIN codes are used there are plenty of other reason to use a PIN, like for opening a gate to a very secured building, and many more!
Legislation
Legislation is basically like a/the rules to agree to, and follow once you buy something. For example, you buy a video-game, somewhere on the cartridge it will say 'not to be copy righted', and will show its trademark sign and will not want you to do the following: Give the copy to a friend, making a copy of it and then selling it, using the software on a network, (unless it allows you to), and renting the piece of software without the permission of the copyright holder. And if anybody breaks these rules, AND they are caught they will have to face serious consequences such as getting prosecuted, or sent to prison for a long, long time...
Biometric Scanners
Now these Biometric-Scanners, are like the state of the art technology that is so advanced that it is nearly equivalent to finding the cure for cancer in the world of technology and computing! So what they are, is that they are basically methods of recognising an individual based on their behaviour and characteristics, to let them pass through to what they want to have, or get into in the first place, but if you are trying to impersonate someone else, it's just not going to work ever, no matter how hard you try! It is measured in many different ways, so that is why it it so advanced. The ways that it is measured in are: Face, fingerprint, hand-geometry, handwriting, iris, retinal, vein and voice, and maybe even more in the future to come!
Encryption
Encryption is one the most effective ways to achieve 100%, (if not 99%), data security. Because of being capable to read an encrypted file, you should have, or more like you HAVE to have the secret password or key to then decrypt it. So as you can guess, they call unencrypted data, (which is 99.99% of all data flowing around and accessible these days), is called 'plain text', while encrypted data is called 'cipher text'.
Forensic Computing
Forensic Computing is basically the allowance for a certain type of an organisation to use analysis techniques to preserve proof to show in the court of law to prove their point right, for instance if they want proof to arrest a criminal for a certain type of crime they have done, and want to look at their profile on certain networking sites, and the only way for them to do that is from hacking into them, then they will get the allowance from the court to hack that particular person, because they will be looking at a potential victim of crime, who is dangerous to be let out on the streets.
Guess that that is it!
I guess that those points that I have listed are all the main ones for the Security Technologies, as of 2015, I hope that that was informative to all you people who have read it, and now you know more, and most of all I hope you enjoyed it!