
Physical Methods
In this section i am going to be talking about the physical methods of fighting crime in ICT. A simple computer theft could include stealing someone’s USB pen drive which contains sensitive information on it. Why was sensible information on a USB stick in the first place? Try asking some government officials they do it all the time and get in trouble when they leave them on the train. Essentially, using physical security is one easy way of preventing people accessing information they shouldn’t see.
Some methods might include:
-
Locking a computer away and only giving certain people a key to the room
-
Making sure your monitor can not be seen by the public
-
Covering up the keyboard so people can not see what you are typing
Using armed mercenaries who each have night vision goggles so that they can see in the dark if the power is cut and who’s minds have been brain washed to feel no pain in the event that they are captured and tortured for the information that people seek.
Or you could use some security cameras and alarm systems whichever you prefer really.
Biometric data is being used more often to help with security scanning the eye, finger prints, voice recognition those are all used today. The popularity of wireless networks has thrown up a fair few issues with security too. Data is floating about all around us these days but securing that data proved difficult with a lock and key even the mercenaries had difficulty in stopping people accessing data so some clever clogs decided they needed to be a bit logical to solve the problem. As you have seen, there are many different ways that you or a business can lose valuable data. With a little bit of planning and thought however, the risks can be reduced or even eliminated. Physical methods of protection are there to stop unauthorised people physically going to the computer and accessing the IT systems. There are many things companies can do to make their equipment more secure:
-
Lock the room when not in use
-
Use swipe cards or keypads to activate locks
-
Bolt computers to the desk
-
Use special pens to mark their postcode onto the computer case
-
Keep windows shut - especially if on the ground floor. Use bars.
-
CCTV video cameras to monitor rooms where the computers are and also the corridors
-
In large firms, security guards
-
Passes which are checked by the security guards
-
Position the screen so passers-by can't see what you are working on
-
Make sure that nobody can see the keyboard whilst you are typing in your password
