Recently, there has been a rise in cyber security breaches
Companies are turning to physical security strategies involving biometric and digital keys to secure their clients' accounts.
Line 238: | Line 238: | ||
<!--//Close Section Three --> | <!--//Close Section Three --> | ||
<div class="contentmargin" | <div class="contentmargin" | ||
− | <p> | + | <p></p> |
− | + | ||
</div> | </div> | ||
</body> | </body> | ||
</html> | </html> | ||
{{:Team:UNOTT/Template/Footer}} | {{:Team:UNOTT/Template/Footer}} |
Recently, there has been a rise in cyber security breaches
Companies are turning to physical security strategies involving biometric and digital keys to secure their clients' accounts.
A randomly assorted biometric which utilises CRISPRi to synthesise a random fluorescent key in E. coli. Our security system is called Key. coli .