The NCSA Guide to PC & LAN Security


Stephen Cobb, CISSP

Chapter 4: Securing Hardware


This chapter is about: Defending and insuring equipment

...the chapter concentrates on preventing hardware from being stolen, vandalized, or otherwise damaged. This does not cover the question of maintaining a smooth supply of power, which is covered in Chapter 5, or how to stop unauthorized people from entering your office and using your hardware, which is covered in Chapter 6. If you want to know how to stop people from using electronic eavesdropping techniques from illicitly obtaining information from your hardware, see Chapter 7.

For companies active in this field check out the following Hot Links at NCSA:

The Story So Far

  • No typos or errors reported so far.
  • Links and supplemental info being prepared.
  • Check back in 10 days for more links and info.

Table of Contents with Links to Chapters

[Top of Page] [PC LAN Security Home Page] [Table of Contents]
This page updated by Stephen Cobb, Summer 2002 © Copyright, 1996-2002, Stephen Cobb