There are two general components of hardware security. One is physical and the other is logical (software). Information infrastructure typically consists of very expensive and sensitive equipment. Measures must be taken to physically protect the equipment. Computers and other devices can be “locked down” either with a cable, behind closed doors or in secured cabinets. Temperature controls and protection from power spikes and extreme elements (such as floods) should also be included in the protection plan. Logical protection can include software measures that can be taken to protect the devices against unauthorized access from unauthorized users (i.e. passwords and the filtering of routers and firewalls).
Its Relevance: Protecting the infrastructure’s tools is essential. The organization’s information security plan must address all aspects of security. The detail even includes the configuration, maintenance and deployment of hardware.
A potentially huge hardware vulnerability is now becoming an issue, that is, mobile computing. Mobile computing hardware devices must be secured.
Return from "Hardware Security" to words [G - I]