home *** CD-ROM | disk | FTP | other *** search
- Newsgroups: comp.sys.hp
- Path: sparky!uunet!usc!sdd.hp.com!mips!darwin.sura.net!jvnc.net!princeton!newross!volkl!dem
- From: dem@volkl (Doron Meyer)
- Subject: Keeping secure w/ physical access
- Message-ID: <1992Aug22.145736.9977@newross.Princeton.EDU>
- Sender: news@newross.Princeton.EDU (USENET News System)
- Organization: Princeton University Computer Science Department
- References: <1992Aug15.022529.7176@mccc.edu> <430131@hpnmdla.sr.hp.com> <1992Aug20.212928.28666@gdwest.gd.com>
- Date: Sat, 22 Aug 1992 14:57:36 GMT
- Lines: 19
-
- In article <1992Aug20.212928.28666@gdwest.gd.com> good@gdwest.gd.com (David L. Good) writes:
- >
- >I realize that physical access allows people to do nasty things, but in
- >our environment, having someone mess around with the connections to the
- >disks would probably be noticed and stopped. Cycling power on a
- >workstation probably would not be noticed. I guess I'd like to see it
- >where a bad guy would have to seriously mess with the hardware to do
- >anything really harmfull. After all, I can't lock all our workstations
- >up in a vault, or nobody would be able to use them!
-
- No, but if you have a decent lab setup, you could put the actual workstations
- in a secure room, and then run cables for the monitor and keyboard which
- would be in a different room.
-
- This way, the miscreant only has a chance when the power goes out.
- And if the machines are in a central location as described above, hooking
- them up to a UPS is trivial.
-
- Doron
-