Linggo, Mayo 22, 2011

Device Identification: A Security Breakthrough

The advent of modern technology has indeed enhanced the lives of people worldwide.  Its progression carries with it however, a threat to its users.  With almost everything and anything accessible through the worldwide web, hackers have become more and more rampant.  Hackers have used modern technology to their advantage, accessing financial information of corporations and gaining entry into their classified information.  As a response to the threats being posed by such web-thieves, companies have found the need to generate systems to be able to protect their IT systems from break ins.  Device Identification is one means of protection that companies have employed.

Device Identification is a technological breakthrough that allows companies to identify computers or Internet devices that attempts to seep into the IT systems of companies.  A number of corporations such as banks and airline companies make use of such a tool to ensure the safety of online bank transactions, for instance.  Such a technology enables companies to identify the location of the hacking device, the time zone that the device is found in, as well as the IP address of the hacker. 

An example of device identification is when a hacker from South Africa tries to enter an account of a client living in Los Angeles and the device identification system sends a red flag indicating that there’s an intruder trying to enter into the system.  The server would then deny access.  Access to a distinct server may also be controlled by the device identification system, allowing only authorized IP addresses to enter into the system, blocking out others.


The Device Identification system utilizes two methods which each have their advantages and disadvantages.  The first method is device fingerprinting and the other is device tagging.  Note that these methods of device identification are not foolproof.  Problems such as an authorized user being blocked from accessing his account arise.  The pros outweigh the benefits however, with device identification lowering significantly the threat illegal or unauthorized hackers pose to corporations.


Despite the advantages of such a system, many advocates for privacy say that there may be confidentiality rights being breeched by this type of system.  This system provides companies with access to information such as who resides with the client and information regarding shopping habits and travel plans.  The risk of private information being sold to third parties is also a concern.

Although concerns regarding privacy and confidentiality are valid, device identification has done a lot to safeguard the companies themselves as well as information of their clients’ financial accounts. This, to them, is a more prime concern.  The advent of device identification, and other systems similar to this security tool, has greatly improved the security systems of many companies.  Although some glitches still remain, the advantages of such a system still outweigh any potential risk the system might bring about.

Walang komento:

Mag-post ng isang Komento