 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
Ø |
Hardware theft is act of stealing
|
|
|
computer equipment
|
|
|
|
§ |
Cables sometimes used to lock
|
|
|
equipment
|
|
|
|
§ |
Some notebook computers use
|
|
|
passwords, possessed objects, and
|
|
|
biometrics as security methods
|
|
|
|
§ |
For PDAs, you can password-
|
|
|
protect the device
|
|
|
Ø |
Hardware vandalism is act of
|
|
|
|
defacing or destroying computer
|
|
equipment
|
|