How To Protect Your Computer From Unauthorized Access

Table of contents:

How To Protect Your Computer From Unauthorized Access
How To Protect Your Computer From Unauthorized Access

Video: How To Protect Your Computer From Unauthorized Access

Video: How To Protect Your Computer From Unauthorized Access
Video: Computer Basics: Protecting Your Computer 2024, November
Anonim

Unauthorized access is dangerous not only by reading personal information, but also by the possibility of outside control over the system using controlled software bookmarks. There is no doubt that the built-in tools of the operating system are not enough for more serious computer protection. Therefore, along with standard protective equipment, it does not hurt to use special means. They are divided into two types: means that restrict physical access, and means that restrict access over the network.

How to protect your computer from unauthorized access
How to protect your computer from unauthorized access

Instructions

Step 1

The most reliable solution to this problem is to use hardware protections that start working before the computer's operating system boots. These protections are called "electronic locks". At the preparatory stage of use, install and configure the lock. Typically, configuration is done by a security administrator.

Step 2

First, create a list of users who will be allowed access to the computer. Create a key carrier for each user. This can be a floppy disk, smart card, or electronic tablet. The list will be saved in the memory of the electronic lock. Next, create a list of files to be protected: application executable modules, operating system system libraries, Microsoft Word document templates, and the like.

Step 3

After installation in normal operation mode, the lock will ask the user for the key carrier. If the user is on the list, then authentication is successful and the operating system starts up. During operation, the lock receives control from the PC BIOS, however, the BIOS of some modern computers can be configured so that control of the lock is not transferred. If you have such a problem, check that your lock has the ability to block the computer from booting (closing the Reset contacts, for example).

Step 4

There is also the possibility that a cracker could simply pull the lock out of the computer. To protect yourself, use the following countermeasures:

• Sealing the case, ensuring the lack of access to the system unit.

• There is a complex protection means when the lock is structurally combined with a hardware encryption device.

• there are also locks that can lock the PC case from the inside.

Recommended: