Controlling system security with a keyswitch

geoff at callan.UUCP geoff at callan.UUCP
Sat Jul 7 06:15:44 AEST 1984


The systems we build here at Callan are also controlled with a keyswitch, and
they, too, use the same key for all units.  Disregarding this, the keyswitch
*does* provide some security (if you are interested in details, mail me).
However, as has been pointed out previously, anyone with physical access to
the system can get around the keyswitch.  On our machine, for example, you
could simply take off the covers and short out the appropriate poles of the
switch.  Assuming that what you are interested in is stealing data, you could
also simply remove the four 5-1/4" Winchesters and walk away with them, later
hooking them onto your own machine as add-on units, and read them that way.

So why did we put the keyswitch on there?  Because most people won't go to that
much trouble.  The keyswitch will stop the casual intruder.  A non-casual one
can't be stopped by the computer manufacturer;  the only real solution is good
control of physical access to the machine.
-- 

	Geoff Kuenning
	Callan Data Systems
	...!ihnp4!wlbr!callan!geoff



More information about the Comp.unix.wizards mailing list