home *** CD-ROM | disk | FTP | other *** search
/ New Perspectives on Comp…er Concepts (3rd Edition) / NP3CD_Intro.iso / NP3CD / PAGE374.PAG < prev    next >
Graphics Interchange Format  |  1997-11-02  |  69KB  |  623x1043  |  8-bit (44 colors)
Labels: chat room | crt screen | earth | grass | hakham | plant | sky | tree | windowpane
OCR: 9-13 DATA SECURITY AND CONTRO Restrict Physica Acce to th Comp ute System If it is S0 easy for hackers to access data from networked computers or terminals or over auoud lines there any point to keeping computers locked up? In 1970 during the Vietnarm War anti-war activists bombed the Army Mathematics Research Center the University of Wisconsin. graduate student was killed the building was damaged and the computer, along with 2 years of accumulated research data was destroved (Figure q- One of the best ways to prevent people from damaging equipment is to restrict physical access to the computer system. If potential criminals cannot get to computer or ter minal, stealing or damaging data becomes more difficult. Here are some ways to phys- ically protect compute eauipment pue data Restrict a ...