skip navigation


Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.


NCJ Number: 114160 Find in a Library
Title: Guide to Cost-Effective PC Security
Journal: Security Management  Volume:32  Issue:10  Dated:(October 1988)  Pages:55-58
Author(s): D W Kelley
Date Published: 1988
Page Count: 4
Type: Issue Overview
Format: Article
Language: English
Country: United States of America
Annotation: Personal computers (PCs) have created additional security concerns because they have decentralized computer power.
Abstract: PC security must protect both equipment and data. Cable and adhesive plate systems can protect against PC theft, and internal components can be protected by using cover bolts or screws. Other units protect from theft by enclosing the PC. Access to data can be secured in four ways: limiting access to the power switch, preventing use of the keyboard, preventing access to specific files, and using access control software requiring a password. Power access products prevent access to internal components and allow the user to secure the PC to a workstation with a cable. Prices range from $70 to $90. Software packages, ranging from $100 to $300, are available that allow access only to selected files. Some packages provide an override capability. Password software packages are available in the $500 to $1,200 price range. Additional factors that should be considered in selecting PC security systems include the effect of the system on warranties, service accessibility, ease of installation, user friendliness, cost, and backup and recovery. Because the success of security solutions depends on employee cooperation, choices should emphasize ease of use and workstation flexibility. Simple, cost-effective security solutions can save company time, money, and worry.
Main Term(s): Computer privacy and security
Index Term(s): Computer crime prevention measures; Computer software
To cite this abstract, use the following link:

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.