Abstract
No one can question the importance of limiting access to computer equipment in establishing a security system. However, with the door to the equipment locked, any potential perpetrator will naturally look for alternative ways of gaining access to the system. This paper looks at ways fraudulent data entry can be accomplished when physical access to data entry devices is denied and offers suggestions for securing those “windows” to the system.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have