ABSTRACT

Personal Computers (PC) are vulnerable to other threats, including the risk of computer viruses, and the risk of loss of data due simply to bad user practices. As more and more company business is carried out on PCs, individual PC users have built databases containing information that previously resided on mainframe systems under the control of the Information Systems manager, or in filing cabinets, and desks, much of it controlled by secretaries and administrators. The chapter aims to consider access control, function, access control to PC, access control to files and applications, access control to devices, A’ drive, comms port, encryption, audit trail, ease of use, and ease of administration. Information Technology has become the vital backbone of every successful business. However, there are numerous threats to the security of these systems, particularly those based on PC/LANs.