Security and Progressing Technology
Security is subject to changing circumstances and escalation. When a new technology comes along the security measures must be designed protect it, hopefully before any attackers do any damage. When old technology continues to be used it is subject to escalation; attackers become more apt at finding ways to break in so security must find ways to stay ahead of them. New security might still include some old and reliable methods, but it is always being added to if not constantly improved.
Changes in security must be used by all involved, if not society at large. Security systems must be implemented with agreement and coordination, with technology and protocols adopted by all users. This can be a lengthy process, perhaps involving legal and bureaucratic processes. It the data and property that the security aims to protect is already operational there may be a window of opportunity for any potential attackers to exploit. Occasionally attackers learn enough about a system to continue exploiting it even when reliable security is later introduced.
If a new technology is suddenly made available, often after years of research, it is hard for law officials to protect it. Criminals can be quite technologically savvy, and quick to exploit a situation. Law officials, who are probably quite capable in their own areas of expertise, may not have the training or background to deal with the new situation. When online computer hacking appeared in the late 1980s the police, use to dealing with bank robberies and hostage situations, did not have the computer facilities to tackle the crime, nor any knowledge beyond the level of the general public. Even the legal situation was hazy – was stealing data the same a stealing a possession.
There is a further advantage for any individual attackers in that they can break in after finding just one weakness in a security system. The defenders, by contrast, need to be aware of every possible weakness in their system, because at any one time there are numerous attackers trying to break in. Defence, at least initially, is the harder situation.
Fingerprint scanning security is a semi-exception to this. When fingerprinting was first introduced in the 19th century the criminals took some time to catch on, and had to develop criminal methods that did not leave fingerprint traces. And by that time many criminals were already caught and behind bars.
Secure premises measures, preventing a criminal for breaking into a company building, will always be important. Fingerprint scanning remains crucial here, being one of the hardest security measures to fake, now we have companies such as Supremanic providing quality finger print scanning technology, with the latest fingerprinting systems being even more secure than earlier designs. Secure premises should always be the first line of defence.