11.07.2015 Views

Summary

Summary

Summary

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

6 IT Essentials: PC Harware and Software Companion GuideProtect individual computers by using the following:■■■■Cable locksLaptop docking station locksLockable casesSecured cages surrounding desktop casesProtect data with hardware that prevents unauthorized access or theft of media through theuse of the following:■■■Lockable hard drive carriersSecure storage and transport of backup mediaUSB security donglesFactors that determine the most effective security equipment to use to secure equipment anddata include the following:■■■How the equipment will be usedComputer equipment locationUser-required access to dataFor example, a computer in a busy public place, such as a library, requires additional protectionfrom theft and vandalism. In a busy call center, a server might need to be secured ina locked equipment room.Where it is necessary to use a laptop computer in a public place, a security dongle, shownin Figure 16-3, ensures that the system locks if the user and laptop are separated.Figure 16-3USB Security Dongle

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!