Line 519: | Line 519: | ||
In conclusion, the ‘threat’ is someone stealing the information when the DNA is sent to a different person or the archive data. In this way, the value of the data might be of high importance, so we need to find a way of protecting it, because our stored data needs to be secure.</h11> | In conclusion, the ‘threat’ is someone stealing the information when the DNA is sent to a different person or the archive data. In this way, the value of the data might be of high importance, so we need to find a way of protecting it, because our stored data needs to be secure.</h11> | ||
</div> | </div> | ||
+ | <br> | ||
+ | <br> | ||
<div align="center"> | <div align="center"> | ||
<a href="#accordion"> | <a href="#accordion"> | ||
Line 551: | Line 553: | ||
</a> | </a> | ||
</div> | </div> | ||
+ | <br> | ||
+ | <br> | ||
</div> | </div> | ||
Revision as of 08:35, 14 October 2016
Team:Edinburgh/Part Collection
Introduction
Another threat can be discovered at the stage when the user wants to decode the DNA sequence into text. Because at this stage your DNA is into a computer which is linked to a network, the risk is quite high of being stolen. We indeed see that the system requests some security measures in order to keep data safe. In conclusion, the ‘threat’ is someone stealing the information when the DNA is sent to a different person or the archive data. In this way, the value of the data might be of high importance, so we need to find a way of protecting it, because our stored data needs to be secure.
Introduction
Another threat can be discovered at the stage when the user wants to decode the DNA sequence into text. Because at this stage your DNA is into a computer which is linked to a network, the risk is quite high of being stolen. We indeed see that the system requests some security measures in order to keep data safe. In conclusion, the ‘threat’ is someone stealing the information when the DNA is sent to a different person or the archive data. In this way, the value of the data might be of high importance, so we need to find a way of protecting it, because our stored data needs to be secure.