Lenovo PC 300GL Understanding Your Personal Computer 6267, 6277, 6287 - Page 44

Security, PC 300GL User Guide

Page 44 highlights

Chapter 6. Security This section provides information about the security features of your computer. Security is important for protecting your computer and the data stored in it. If you use your computer in a public environment, such as an office, you might want to protect the computer and data by using one or more of the security features available to you. Some of the features include: A lockable cover using a customer supplied padlock to help secure computer hardware components A u-bolt and a lockable cable can be installed to secure the computer to a desk or table. A power-on password to help prevent unauthorized use of the computer An administrator password to authorize computer-setup changes An unattended start mode to enable the computer to operate without input from the keyboard or mouse A selectable startup sequence to prevent use of unauthorized programs to bypass security controls Selectable disabling of diskette and IDE drives to prevent unauthorized use I/O port control to disable input and output functions of the serial and parallel ports and their attached devices The use of some features also depends on your operating system and network software. For detailed information about using these security features, see the PC 300GL User Guide. While the security features can offer a good deal of protection for your computer and data, there are limitations, depending on the operating environment. For example, these features cannot authenticate or identify the adapter that attaches the computer to a LAN, and they cannot prevent outside persons or computers from gaining access to the computer, if it is equipped with a modem set to the automatic answering mode. A major aspect of your security plan is protecting the information (data) stored in your computer. Some of the considerations of data security are: Backup and recovery Erased files Computer viruses 36 © Copyright IBM Corp. 1998

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68

Chapter 6.
Security
This section provides information about the security features of your computer.
Security is important for protecting your computer and the data stored in it.
If you use
your computer in a public environment, such as an office, you might want to protect the
computer and data by using one or more of the security features available to you.
Some of the features include:
±
A lockable cover using a customer supplied padlock to help secure computer hardware
components
±
A u-bolt and a lockable cable can be installed to secure the computer to a desk or table.
±
A power-on password to help prevent unauthorized use of the computer
±
An administrator password to authorize computer-setup changes
±
An unattended start mode to enable the computer to operate without input from the
keyboard or mouse
±
A selectable startup sequence to prevent use of unauthorized programs to bypass
security controls
±
Selectable disabling of diskette and IDE drives to prevent unauthorized use
±
I/O port control to disable input and output functions of the serial and parallel ports
and their attached devices
The use of some features also depends on your operating system and network software.
For detailed information about using these security features, see the
PC 300GL User Guide
.
While the security features can offer a good deal of protection for your computer and data,
there are limitations, depending on the operating environment.
For example, these features
cannot authenticate or identify the adapter that attaches the computer to a LAN, and they
cannot prevent outside persons or computers from gaining access to the computer, if it is
equipped with a modem set to the automatic answering mode.
A major aspect of your security plan is protecting the information (data) stored in your
computer.
Some of the considerations of data security are:
±
Backup and recovery
±
Erased files
±
Computer viruses
36
Copyright IBM Corp. 1998