The System
The Device Identification system monitors particular computers and assesses their detailed histories of transactions. The system is able to track the device’s past actions and notes whether these computers have engaged in any notoriety or not. Ordinary computers that have engaged in fraud are tagged by the system and, in a way, blacklisted and blocked from accessing certain sites. With the Device Identification System, such rampant notoriety is avoided.
Advantages
Its ability to work without needing the user to start the system up him or herself is one of the primary benefits of the system. The usual Internet security sites overload system resources and send out a great number of pop-ups that confuse computer users and are not as effective in keeping unauthorized users from entering certain sites. In contrast, the Device Identification System enables the user to work smoothly and with ease with the computer running as if nothing else were at work. With this the user or the computer experiences no interruptions.
Disadvantages
The primary disadvantage of Device Identification is breach of confidentiality. For the system to be able to monitor particular computers and track their activities, it must have access to the user’s personal information. In order for a system to be more effective in its vigilance to protect companies and clients however, there is a compromise when it comes to privacy. Inaccurate tags are also another downside to this system. Although imposters are kept out, there is that possibility for decent users to be barred from sites as well, labeling them as threats to security. Because of these issues, actions are being made to come up with methods to alleviate these unwarranted events from transpiring.
Conclusion
Device identification tags computers by looking into data such as IP address, past actions, trends of behavior and location of users. Financial transactions are also monitored by device identification systems. Confidential and personal user’s information however are made vulnerable due to the need for the system to access these in order to be effective. Despite the disadvantages it poses, device identification is promising in its ability to keep the worldwide web secure from threats posed by intruders and hackers. Because of its pliability and progressive nature, together with its ability to run without interrupting the user’s work, it sets itself apart and above any conventional Internet security site.
