Client computers
Control important business functions
Same physical security as early systems
New physical security technologies
Fingerprint readers (less than $100)
Stronger protection than password approaches
Biometric security device
Identification using element of person’s biological makeup
Writing pads, eye scanners, palm reading scanners, reading back of hand vein pattern