Abstract

No one can question the importance of limiting access to computer equipment in establishing a security system. However, with the door to the equipment locked, any potential perpetrator will naturally look for alternative ways of gaining access to the system. This paper looks at ways fraudulent data entry can be accomplished when physical access to data entry devices is denied and offers suggestions for securing those “windows” to the system.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call