Introduction As security risks develop over time, the technology used to address them has had to keep pace. High-security ...