![]() ![]() Tip: Save one of the fingerprints from your other hand just in case. Also, a fingerprint scanner should be built into the case of a device, since retrofitted versions take up unnecessary space and make the scanner awkward to use. Possible cons of this solution: In some cases it takes several tries before a fingerprint is read correctly. For security purposes it's important that the fingerprint image data on the hard drive is encrypted. In addition to freeing the user from having to carry around a Smartcard, a fingerprint scanner saves the user the hassle of a password, which must be remembered and periodically changed. This kind of a system is easy to use and effective. If a fingerprint scanner is present and active, it prohibits anyone from entering the system unless the correct fingerprint is scanned and recognized. Just as problematic: If the user forgets to take the Smartcard along, he or she will not have access to his or her own data.Īn alternative that sidesteps the aforementioned cons of the Smartcard is the fingerprint scanner. In this case the human factor can easily undermine the protection. If the user leaves the Smartcard in the device and walks away, or if he or she carries around the Smartcard with its access code in the same bag as the notebook, the protection is lost. Pros taken into account, there are also some cons to using a Smartcard to increase data security. An SD card slot is however standard for modern notebooks. Such solutions free up that otherwise occupied USB port, though there must be an SD card slot on the notebook. Software also exists that can convert SD cards into Smartcards. There are USB ports on practically every notebook. A pro in comparison with a Smartcard: No special reading device is necessary. There are also special USBs that function similarly to a Smartcard - they also contain important access data on their stick. It's best if the reading device is integrated into the case of the notebook, but there is a version that can be retrofitted to a PC card or ExpressCard slot. The notebook must have the proper reading device to recognize the Smartcard. This data can be saved encrypted and only become unencrypted while the Smartcard is active. It is also possible to set a Smartcard so that data can only be used if the proper card is present. If access to a notebook is dependent on a Smartcard, the computer checks the data on the Smartcard against data on the computer and only gives the user access to the notebook if the data agrees. Important: The data should be locked on the Smartcard so that it cannot simply be read and used. The card then releases its information only after this code is entered correctly. Identification is often confirmed by the use of a security code in conjunction with a smart card. EC cards and access cards for doors are examples of this technology. It contains stored information or can even have its own processor. A Smartcard is, as the name suggests, a "smart" card that acts like a key. One approach to better data protection is the use of Smartcards. There is demand, then, for security that functions even if the user fails. If the creator uses standard phrases or chooses the name of their wife, children or pet, often a little experimentation is enough for the thief to break through to the data. This is especially true if the creator of the password was inexperienced and naive in choosing the password. Even if the thief doesn't know the password, there is still a high chance of him or her getting their hands on sensitive data. Simple password protection upon the start-up of a computer doesn't constitute much of a hurdle for many offenders. In light of that, when selecting a notebook for business use, security is a top concern. Unauthorized access to the hard drive of a notebook or the server of a business can have terrible repercussions, and in some cases it can even put the life of the company in jeopardy. ![]() It can be information as secret as the intelligence of the secret service: Company data. ![]() For the original German review, see here.
0 Comments
Leave a Reply. |