What will information security be like in the 21st century? The nature of computing has changed over the last few years. Networks are designed and built to facilitate the sharing and distribution of data and information. Controlling access to these resources can become a problem because you need to balance the requirement for access to free information with the value of the content of that information.
Some information is more sensitive in nature than other information; this leads to the need for security requirements. Today, IT security has progressed to more than just user names and passwords. It involves digital identities, biometric authentication methods, and modular security strategies.
The easiest one to relate to is the use of smart cards. These are tamper-proof devices that store security information. They are similar to a credit card with a built-in microprocessor and memory used for identification or financial transactions. When the user inserts it into a reader, it transfers data to and from a central computer. It is more secure than a magnetic stripe card and can be programmed to self-destruct if the wrong password is entered too many times. As a financial transaction card, it can be loaded with digital money and used like a travelers check, except that variable amounts of money can be spent until the balance is zero.