HARDWARE THEFT AND VANDALISM
- Are other types of computer security risk
- the act of stealing computer equipment
- the act of defacing or destroying computer equipment
- Forms include: cutting a computer cable to individuals breaking into a business or school computer lab and aimlessly smashing computers
- Physical access controls such as locked doors and windows
- Alarm systems
- Cables that lock the equipment to a desk, cabinet or floor
- Small locking devices (access to hard disk and optical disk drive)
- Some businesses use this to track and identify the location of high-risk or high-value items
- One implementation of RTLS places RFID tags in items to be tracked
- A physical device such as a cable to lock a mobile computer temporarily to a stationary object (for mobile devices)