HPlogo User's Guide to MPE/iX Security: HP 3000 MPE/iX Computer Systems > Chapter 1 Introduction

Physical Security

» 

Technical documentation

Complete book in PDF
» Feedback

 » Table of Contents

 » Index

Physical security involves the prevention of physical damage to system hardware, and prevention of the corruption of software. The causes of damage to hardware and software can range from deliberate sabotage or vandalism, to inadvertent damage caused by unskilled users.

Physical access to hardware is usually effected by perimeter controls, which restrict entry into areas in which computer equipment is located.

Access to software is usually controlled by logon restrictions. Such restrictions include the use of passwords, establishment of accounts and groups, and control of user capabilities. Access to programs and files can be provided by assigning users to accounts, issuing appropriate capabilities, using passwords, lockwords, and creating programs and files in groups that belong to special accounts. The physical aspect of securing access to software involves prevention of physical access to terminals, and limitations on or prevention of access via communication lines.

Feedback to webmaster