Team:Edinburgh/Part Collection
Introduction
Another threat can be discovered at the stage when the user wants to decode the DNA sequence into text. Because at this stage your DNA is into a computer which is linked to a network, the risk is quite high of being stolen. We indeed see that the system requests some security measures in order to keep data safe. In conclusion, the ‘threat’ is someone stealing the information when the DNA is sent to a different person or the archive data. In this way, the value of the data might be of high importance, so we need to find a way of protecting it, because our stored data needs to be secure.
Introduction
Another threat can be discovered at the stage when the user wants to decode the DNA sequence into text. Because at this stage your DNA is into a computer which is linked to a network, the risk is quite high of being stolen. We indeed see that the system requests some security measures in order to keep data safe. In conclusion, the ‘threat’ is someone stealing the information when the DNA is sent to a different person or the archive data. In this way, the value of the data might be of high importance, so we need to find a way of protecting it, because our stored data needs to be secure.