Hardware Mechanisms That Protect Computers and Data
See also: Computer security compromised by hardware failureWhile hardware may be a source of insecurity, hardware based or assisted computer security offers an alternative to software-only computer security. Devices such as dongles, case intrusion detection, drive locks, or disabling USB ports, or CD ROM Drives may be considered more secure due to the physical access required in order to be compromised. This is important to know for data conservation.
Read more about this topic: Security Architecture
Famous quotes containing the words hardware, protect and/or data:
“A friend of mine spoke of books that are dedicated like this: To my wife, by whose helpful criticism ... and so on. He said the dedication should really read: To my wife. If it had not been for her continual criticism and persistent nagging doubt as to my ability, this book would have appeared in Harpers instead of The Hardware Age.”
—Brenda Ueland (18911985)
“Every man I meet wants to protect me. I cant figure out what from.”
—Mae West, U.S. screenwriter, W.C. Fields, and Edward Cline. Flower Belle Lee (Mae West)
“This city is neither a jungle nor the moon.... In long shot: a cosmic smudge, a conglomerate of bleeding energies. Close up, it is a fairly legible printed circuit, a transistorized labyrinth of beastly tracks, a data bank for asthmatic voice-prints.”
—Susan Sontag (b. 1933)