SlideShare uma empresa Scribd logo
1 de 11
COMPUTER CRIME
   - HACKING
  A Gift of Fire
          Third edition
  Sara Baase - P.282 to P.306
HACKING

•   Hacking – currently defined as to gain illegal or unauthorized access to a file,
    computer, or network

•   The term has changed over time

•   Phase 1: early 1960s to 1970s

    •   It was a positive term

    •   A "hacker" was a creative programmer who wrote elegant or clever code

    •   A "hack" was an especially clever piece of code
HACKING (CONT.)
• Phase     2: 1970s to mid 1990s
  • Hacking     took on negative connotations
  • Breaking into computers for which the hacker does not
    have authorized access
  • Still   primarily individuals
  • Includesthe spreading of computer worms and viruses
    and ‘phone phreaking’
  • Companies       began using hackers to analyze and improve
    security
HACKING (CONT.)
• Phase   3: beginning with the mid 1990s

  • The
      growth of the Web changed hacking; viruses and
   worms could be spread rapidly

  • Political   hacking (Hacktivism) surfaced

  • Denial-of-service    (DoS) attacks used to shut down Web
   sites

  • Large   scale theft of personal and financial information
HACKING (CONT.)
Hacktivism, or Political Hacking:
• Use   of hacking to promote a political cause
• Disagreement about whether it is a form of civil
 disobedience and how (whether) it should be punished
• Some use the appearance of hacktivism to hide other
 criminal activities
• How  do you determine whether something is hacktivism
 or simple vandalism?
HACKING (CONT.)

The Law: Catching and Punishing Hackers:

•   1986 Congress passed the Computer Fraud and Abuse Act (CFAA)

    •   Covers government computers, financial and medical systems, and
        activities that involve computers in more than one state, including
        computers connected to the Internet

    •   The USA Patriot Act expanded the definition of loss to include the
        cost of responding to an attack, assessing damage and restoring
        systems
HACKING (CONT.)

The Law: Catching and Punishing Hackers (cont.):

•   A variety of methods for catching hackers

    •   Law enforcement agents read hacker newsletters and participate in chat rooms
        undercover

    •   They can often track a handle by looking through newsgroup archives

    •   Security professionals set up ‘honey pots’ which are Web sites that attract hackers, to
        record and study

    •   Computer forensics is used to retrieve evidence from computers
HACKING (CONT.)

The Law: Catching and Punishing Hackers (cont.):

•   Penalties for young hackers

    •   Many young hackers have matured and gone on to productive and responsible careers

    •   Temptation to over or under punish

    •   Sentencing depends on intent and damage done

    •   Most young hackers receive probation, community service, and/or fines

    •   Not until 2000 did a young hacker receive time in juvenile detention
HACKING (CONT.)
The Law: Catching and Punishing Hackers (cont.):

•   Security
    •   Internet started with open access as a means of sharing
        information for research

    •   Attitudes about security were slow to catch up with the risks
    •   Firewalls are used to monitor and filter out communication from
        untrusted sites or that fit a profile of suspicious activity
    •   Security is often playing catch-up to hackers as new vulnerabilities
        are discovered and exploited
HACKING (CONT.)

The Law: Catching and Punishing Hackers (cont.):

•   Responsibility for Security

    •   Developers have a responsibility to develop with security as a goal

    •   Businesses have a responsibility to use security tools and monitor
        their systems to prevent attacks from succeeding

    •   Home users have a responsibility to ask questions and educate
        themselves on the tools to maintain security (personal firewalls,
        anti-virus and anti-spyware)
HACKING
          DISCUSSION QUESTIONS



• Ishacking that does no direct damage or theft a victimless
  crime?

• Do you think hiring former hackers to enhance security is a
  good idea or a bad idea? Why?

Mais conteúdo relacionado

Mais procurados

Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical HackingAkshay Kale
 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An IntroductionJayaseelan Vejayon
 
Hacking and its types V2
Hacking and its types V2Hacking and its types V2
Hacking and its types V2Mian Khayyam
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentationZahid Rajeel
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionBharat Thakkar
 
Computer hacking
Computer hackingComputer hacking
Computer hackingArjun Tomar
 
Ethical Hacking and Network Security
Ethical Hacking and Network SecurityEthical Hacking and Network Security
Ethical Hacking and Network Securitysumit dimri
 
TYPES OF HACKING
TYPES OF HACKINGTYPES OF HACKING
TYPES OF HACKINGSHERALI445
 
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...Qazi Anwar
 
Introduction Ethical hacking by eslam hussein
Introduction Ethical hacking by eslam husseinIntroduction Ethical hacking by eslam hussein
Introduction Ethical hacking by eslam husseinEslam Hussein
 

Mais procurados (18)

Hacking
HackingHacking
Hacking
 
Hacking presentation
Hacking presentationHacking presentation
Hacking presentation
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
Hacking
HackingHacking
Hacking
 
Hacking presentation BASIC
Hacking presentation BASICHacking presentation BASIC
Hacking presentation BASIC
 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An Introduction
 
Hacking and its types V2
Hacking and its types V2Hacking and its types V2
Hacking and its types V2
 
HACKING
HACKINGHACKING
HACKING
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
 
Computer hacking
Computer hackingComputer hacking
Computer hacking
 
Hacking
HackingHacking
Hacking
 
Ethical Hacking and Network Security
Ethical Hacking and Network SecurityEthical Hacking and Network Security
Ethical Hacking and Network Security
 
TYPES OF HACKING
TYPES OF HACKINGTYPES OF HACKING
TYPES OF HACKING
 
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Introduction Ethical hacking by eslam hussein
Introduction Ethical hacking by eslam husseinIntroduction Ethical hacking by eslam hussein
Introduction Ethical hacking by eslam hussein
 

Destaque

Hacking & its types
Hacking & its typesHacking & its types
Hacking & its typesSai Sakoji
 
Virus and hacker (2)mmm
Virus and hacker (2)mmmVirus and hacker (2)mmm
Virus and hacker (2)mmmandynova
 
Computer forensics 1
Computer forensics 1Computer forensics 1
Computer forensics 1Jinalkakadiya
 
Web defacement
Web defacementWeb defacement
Web defacementstudent
 
Hacking and Hackers
Hacking and HackersHacking and Hackers
Hacking and HackersFarwa Ansari
 
Advantages & disadvantages of system life cycles
Advantages & disadvantages of system life cyclesAdvantages & disadvantages of system life cycles
Advantages & disadvantages of system life cycleshout300
 
Power Point Hacker
Power Point HackerPower Point Hacker
Power Point Hackeryanizaki
 
The effects of social networks on personal relationships
The effects of social networks on personal relationshipsThe effects of social networks on personal relationships
The effects of social networks on personal relationshipsrobindedmondthompson
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report Shishupal Nagar
 
role of media in society
role of media in societyrole of media in society
role of media in societyAnamika Pandey
 
Types of databases
Types of databasesTypes of databases
Types of databasesPAQUIAAIZEL
 
Effects of social media on Youth
Effects of social media on YouthEffects of social media on Youth
Effects of social media on YouthSubham Dwivedi
 
The impact of social media
The impact of social mediaThe impact of social media
The impact of social mediaememdesign
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical HackingNeel Kamal
 
ethical hacking in the modern times
ethical hacking in the modern timesethical hacking in the modern times
ethical hacking in the modern timesjeshin jose
 
Effects of social media on youth
Effects of social media on youthEffects of social media on youth
Effects of social media on youthAkshay Mistri
 
Influence of media on society ppt
Influence  of media  on  society pptInfluence  of media  on  society ppt
Influence of media on society pptsharmi88
 

Destaque (20)

Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
 
Virus and hacker (2)mmm
Virus and hacker (2)mmmVirus and hacker (2)mmm
Virus and hacker (2)mmm
 
Computer forensics 1
Computer forensics 1Computer forensics 1
Computer forensics 1
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Web defacement
Web defacementWeb defacement
Web defacement
 
Hacking and Hackers
Hacking and HackersHacking and Hackers
Hacking and Hackers
 
Windows Hacking
Windows HackingWindows Hacking
Windows Hacking
 
Advantages & disadvantages of system life cycles
Advantages & disadvantages of system life cyclesAdvantages & disadvantages of system life cycles
Advantages & disadvantages of system life cycles
 
Power Point Hacker
Power Point HackerPower Point Hacker
Power Point Hacker
 
The effects of social networks on personal relationships
The effects of social networks on personal relationshipsThe effects of social networks on personal relationships
The effects of social networks on personal relationships
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
role of media in society
role of media in societyrole of media in society
role of media in society
 
Types of databases
Types of databasesTypes of databases
Types of databases
 
Effects of social media on Youth
Effects of social media on YouthEffects of social media on Youth
Effects of social media on Youth
 
The impact of social media
The impact of social mediaThe impact of social media
The impact of social media
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
ethical hacking in the modern times
ethical hacking in the modern timesethical hacking in the modern times
ethical hacking in the modern times
 
Effects of social media on youth
Effects of social media on youthEffects of social media on youth
Effects of social media on youth
 
Influence of media on society ppt
Influence  of media  on  society pptInfluence  of media  on  society ppt
Influence of media on society ppt
 

Semelhante a Computer crime hacking

Semelhante a Computer crime hacking (20)

Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Ethicalhacking 130906120356-
Ethicalhacking 130906120356-Ethicalhacking 130906120356-
Ethicalhacking 130906120356-
 
Ethicalhacking
Ethicalhacking Ethicalhacking
Ethicalhacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Hacking (1)
Hacking (1)Hacking (1)
Hacking (1)
 
Hacking
HackingHacking
Hacking
 
Hacking
Hacking Hacking
Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Hacking (1)
Hacking (1)Hacking (1)
Hacking (1)
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking
Hacking Hacking
Hacking
 
cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in education
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211
 

Mais de tangytangling

Power point presentations
Power point presentationsPower point presentations
Power point presentationstangytangling
 
Impact of broadcast media
Impact of broadcast mediaImpact of broadcast media
Impact of broadcast mediatangytangling
 
E voting and lobbying with the aid of technology
E voting and lobbying with the aid of technologyE voting and lobbying with the aid of technology
E voting and lobbying with the aid of technologytangytangling
 
Computer modelling and simulations
Computer modelling and simulationsComputer modelling and simulations
Computer modelling and simulationstangytangling
 
Computer crime hacking
Computer crime   hackingComputer crime   hacking
Computer crime hackingtangytangling
 

Mais de tangytangling (7)

Power point presentations
Power point presentationsPower point presentations
Power point presentations
 
Impact of broadcast media
Impact of broadcast mediaImpact of broadcast media
Impact of broadcast media
 
E voting and lobbying with the aid of technology
E voting and lobbying with the aid of technologyE voting and lobbying with the aid of technology
E voting and lobbying with the aid of technology
 
Ecological pyramids
Ecological pyramidsEcological pyramids
Ecological pyramids
 
Computer modelling and simulations
Computer modelling and simulationsComputer modelling and simulations
Computer modelling and simulations
 
Computer crime hacking
Computer crime   hackingComputer crime   hacking
Computer crime hacking
 
Netiquette
NetiquetteNetiquette
Netiquette
 

Computer crime hacking

  • 1. COMPUTER CRIME - HACKING A Gift of Fire Third edition Sara Baase - P.282 to P.306
  • 2. HACKING • Hacking – currently defined as to gain illegal or unauthorized access to a file, computer, or network • The term has changed over time • Phase 1: early 1960s to 1970s • It was a positive term • A "hacker" was a creative programmer who wrote elegant or clever code • A "hack" was an especially clever piece of code
  • 3. HACKING (CONT.) • Phase 2: 1970s to mid 1990s • Hacking took on negative connotations • Breaking into computers for which the hacker does not have authorized access • Still primarily individuals • Includesthe spreading of computer worms and viruses and ‘phone phreaking’ • Companies began using hackers to analyze and improve security
  • 4. HACKING (CONT.) • Phase 3: beginning with the mid 1990s • The growth of the Web changed hacking; viruses and worms could be spread rapidly • Political hacking (Hacktivism) surfaced • Denial-of-service (DoS) attacks used to shut down Web sites • Large scale theft of personal and financial information
  • 5. HACKING (CONT.) Hacktivism, or Political Hacking: • Use of hacking to promote a political cause • Disagreement about whether it is a form of civil disobedience and how (whether) it should be punished • Some use the appearance of hacktivism to hide other criminal activities • How do you determine whether something is hacktivism or simple vandalism?
  • 6. HACKING (CONT.) The Law: Catching and Punishing Hackers: • 1986 Congress passed the Computer Fraud and Abuse Act (CFAA) • Covers government computers, financial and medical systems, and activities that involve computers in more than one state, including computers connected to the Internet • The USA Patriot Act expanded the definition of loss to include the cost of responding to an attack, assessing damage and restoring systems
  • 7. HACKING (CONT.) The Law: Catching and Punishing Hackers (cont.): • A variety of methods for catching hackers • Law enforcement agents read hacker newsletters and participate in chat rooms undercover • They can often track a handle by looking through newsgroup archives • Security professionals set up ‘honey pots’ which are Web sites that attract hackers, to record and study • Computer forensics is used to retrieve evidence from computers
  • 8. HACKING (CONT.) The Law: Catching and Punishing Hackers (cont.): • Penalties for young hackers • Many young hackers have matured and gone on to productive and responsible careers • Temptation to over or under punish • Sentencing depends on intent and damage done • Most young hackers receive probation, community service, and/or fines • Not until 2000 did a young hacker receive time in juvenile detention
  • 9. HACKING (CONT.) The Law: Catching and Punishing Hackers (cont.): • Security • Internet started with open access as a means of sharing information for research • Attitudes about security were slow to catch up with the risks • Firewalls are used to monitor and filter out communication from untrusted sites or that fit a profile of suspicious activity • Security is often playing catch-up to hackers as new vulnerabilities are discovered and exploited
  • 10. HACKING (CONT.) The Law: Catching and Punishing Hackers (cont.): • Responsibility for Security • Developers have a responsibility to develop with security as a goal • Businesses have a responsibility to use security tools and monitor their systems to prevent attacks from succeeding • Home users have a responsibility to ask questions and educate themselves on the tools to maintain security (personal firewalls, anti-virus and anti-spyware)
  • 11. HACKING DISCUSSION QUESTIONS • Ishacking that does no direct damage or theft a victimless crime? • Do you think hiring former hackers to enhance security is a good idea or a bad idea? Why?

Notas do Editor

  1. \n
  2. Hacking was more of an exploratory activity, pioneering computer science through learning to do new things. \n\n“exploring the details of programmable systems and how to stretch their capabilities.” New Hackers Disctionary\n\nHelped with the development of computer systems in learning to do new things with computers. “The only limits are those that we set ourselves”\n
  3. The definition took a new twist owing to hackers beginning to test authority, manipulate systems and spread viruses.\n\nAlong with this came pranks and thefts of information, software or even money.\n\nThe challenge of hacking became more about taking on research centres, government agencies or corporations. Bigger they are, harder they fall mentality. Led to rise of ‘Trophy Hacking’ 1986 one hacker broke into 30-60 computers at Stanford University, 15 Silicon Valley companies, three government laboratories and numerous other sites.\n\nHacking became a serious threat with the development of sniffer programs (programs designed to extract passwords). 1994 estimates suggest one million passwords might have been compromised over the Internet.\n\nMore people realised possibilities with hacking. \n\nRussian man steals US $400,000 from Citcorp, transfers US $11 million to bank ac’s in other countries.\nKevin Mitnick - hacked and stole files and software from companies such as Nokia and Motorola.\nRobert Morris - Cornell Univerity graduate sent a worm over the Internet causing huge impact to the running of UNIX systems.\n\n\n
  4. Even before Windows 98 had shipped a hacker had already written a virus for it.\n\nHackers modified an online gambling site in 1998 so that everyone won. The site lost US $1.9 million\n\nDefacing on web-sites such as US Army web-site. Tried to make it look like the work of the Chinese. CIA web site defaced to Central Stupidity Agency. The Department of Justice became the Department of Injustice. Even Web pages of the White House altered.\n\nHackers stealing information to threaten people, particularly hacks coming out of Eastern Europe. Rise of hacking groups or syndicates. Leads to systematic and planned attacks.\n\nSafety systems compromised including airport towers.\n\nILOVEYOU virus spread through Windows and via Microsoft Outlook, damaging media files, modified the OS and Internet browser settings. Furthermore it collected passwords. Major Corporations affected Form and Siemens plus government agencies e.g. NASA and British Parliament. Approx US $10 billion in damages.\n\nIncreased availability of hacking programs on the Net. Rise of script kiddies.\n\nDDoS attacks, overloading a target site with with hundreds of thousands of requests for webpages and other information. The attacks are planted in many different computer systems to carry out the attack, hence the term distributed.\n\nWhere could this all go: - as technology use grows and spreads, then hacking will increase and potentially become more destructive. Now that we have computer technology that controls devices and not just information, the potential for hackers to wreak havoc is huge.\n\nIs hacking harmless? Difficult for systems administrators to distinguish a hacker with no malicious intent from a thief, terrorist or spy. Cost to business and inconvenience to clients / customers. For example, young Danish hackers broke into the National Weather Service. Cost the weather service resources, plus the associated police work. Hackers with no intent to cause harm can make mistakes. It is the uncertainty that is the biggest fear.\n
  5. Hactivism - legitimate form of civil disobediance? Dependence on perspective and stakeholders. Difference between freedom of speech and compelling people to listen. In countries where there is free speech it is less easy to justify hactivism. There is also the embarrassment to consider for those who are affected.\n\nHactivism was also used as a decoy for groups intent on doing greater damage.\n
  6. Intentional access to and use of a computer without authorisation are now criminal offences in the US. Federal legislation to cover state differences.\n\nIncludes when done knowingly and exceeding level of authorisation. Includes accessing a computer system, using network services, accessing files, copying data / programs, modifying / destroying data or files.\n\nComputers connected to the Internet are covered, thus can be used for DDoS attacks.\n\nStrong penalties 1- 10 year prison sentence for first offence and fines of up to US $250,000.\n\nStill ambiguity over what constitutes authorisation. Some may say the ability to reasonable do their work is compromised by a lack of authorisation. Also, it is hard to define ‘poor judgement’\n\nAnti-terrorism response to the attacks of September 11, resulting in the USA Patriot Act made amendments to the CFAA and with several amendments made to toughen the stance on hackers.\n\n
  7. Track a hacker BBC video.\n\nCan take a reasonably quick time to catch a hacker, many hackers of major crimes are caught within one week.\n\nHoney pots sites. Also estimated that 30% of the subscribers to 2600, a computer hacking magazine, a law enforcement agents, so that they are familiar with the language.\n\nSearch via handles on forums of those hackers bragging about exploits,\n\nComputer / Digital Forensics - collecting evidence from computer files or disks. Traces of ISP logs and logs of routers.\n\nEach time a hacker is ousted, remaining hackers learn what mistakes to avoid. \n\nCriminal charges are usually filed and a trial takes place where the crime was committed. Laws therefore, differ between countries and states. This makes it difficult to carry out investigations in other countries. The person who wrote the ILOVEYOU virus was from the Philippines, which had no law that applied to his actions.\n\n\n
  8. One would think that the crime for hacking should fit the crime. For example, terrorists who kill thousands of people through hacking should receive the same penalty as those who carried out September 11. Unauthorised access should be treated the same way as trespassing. Web defacing the same way as vandalism. So, it goes on.\n\nParticular problem with young hackers who are inexperienced, do not intend to damage and through accident and / or immaturity do far more damage than they can pay for.\n\nMost hackers under the age of 18 in the Western World receive light sentences e.g. two / three years probabtion, community service, small fine for damages.\n\nInconsistency for those just over 18.\n\nSome want heavier penalties to send a message because of the costs involved and damage that it can do to people. However, we should not punish because of the future potential to do something.\n\nArgued that we want hackers to mature and use their skills in better ways for the benefit of society. For example, give them a job helping a company improve its security and understand how it is vulnerable. We also need appropriate penalties, education and, most of all, parental responsibiliy about safe behaviour with computers. \n
  9. Argument that what hackers were able to access posed no risk. Hence, computer security continued to be weak.\n\nThe Internet was not designed with security in mind, it was a means of communication and sharing of information.\n\nIncreased storage of information through networked systems that security now has to be a bigger issue that needs addressing. With many developments security was largely ignored until something happened. A reactionary approach, therefore, existed. This reaction is very much a human trait - the horse has already bolted. This attitude has now changed as we have become more security conscious.\n\nFirewalls are now very common!\n
  10. Change in attitude for systems developers, security is now a goal.\n\nBusiness responsibility not only to themselves but to their clients and customers.\n\nCompanies have begun to provide ‘hacker insurance’ in a similar way that Insurance companies lower the premium for home with burglar alarms and other anti-theft devices. Similarly credit is given for having spyware and anti-virus software.\n\nAs mentioned, some companies also invest in hackers texsting their security systems. The use of hackers for such purposes has been called into question.\n\nWhile many companies invest very heavily in security, it must be recognised that computer systems are complex and that perfection cannot be achieve and unexpected flaws will always surface.\n\nLarge market now exists for computer security products. Very big development in biometric authentication.\n
  11. \n