Computer lock

Last updated

A computer lock is a physical lock on a computer with an accompanying key used for access control or as an anti-theft system.

Contents

History

In the 1980s and early 1990s, IBM Personal Computers and some PC compatibles included a tubular pin tumbler lock on the computer's casing, performing a security function that varied by manufacturer. In some instances, the lock would prevent the case from being opened to inhibit the theft or modification of internal components. In other cases, the lock was used to forbid unauthorized access to the computer by disabling the power supply, hard drive, or keyboard. [1] Other early personal computer locks include Maclocks, introduced by Compulocks in 1986. [2]

Built-in computer locks for access control were phased out by computer manufacturers in the 1990s as operating systems and other software incorporated user profiles with passwords, but computer locks to prevent theft are still in use, more commonly in the form of Kensington locks that attach cables to laptops and small desktops in an effort to prevent them from being taken. [3]

See also

Related Research Articles

<span class="mw-page-title-main">Access control</span> Selective restriction of access to a place or other resource, allowing only authorized users

In physical security and information security, access control (AC) is the selective restriction of access to a place or other resource, while access management describes the process. The act of accessing may mean consuming, entering, or using. Permission to access a resource is called authorization.

<span class="mw-page-title-main">Physical security</span> Measures designed to deny unauthorized access

Physical security describes security measures that are designed to deny unauthorized access to facilities, equipment, and resources and to protect personnel and property from damage or harm. Physical security involves the use of multiple layers of interdependent systems that can include CCTV surveillance, security guards, protective barriers, locks, access control, perimeter intrusion detection, deterrent systems, fire protection, and other systems designed to protect persons and property.

<span class="mw-page-title-main">Secure cryptoprocessor</span> Device used for encryption

A secure cryptoprocessor is a dedicated computer-on-a-chip or microprocessor for carrying out cryptographic operations, embedded in a packaging with multiple physical security measures, which give it a degree of tamper resistance. Unlike cryptographic processors that output decrypted data onto a bus in a secure environment, a secure cryptoprocessor does not output decrypted data or decrypted program instructions in an environment where security cannot always be maintained.

<span class="mw-page-title-main">Combination lock</span> Type of locking device in which a sequence of symbols, usually numbers, is used to open the lock

A combination lock is a type of locking device in which a sequence of symbols, usually numbers, is used to open the lock. The sequence may be entered using a single rotating dial which interacts with several discs or cams, by using a set of several rotating discs with inscribed symbols which directly interact with the locking mechanism, or through an electronic or mechanical keypad. Types range from inexpensive three-digit luggage locks to high-security safes. Unlike ordinary padlocks, combination locks do not use keys.

<span class="mw-page-title-main">Lock and key</span> Mechanical or electronic fastening device

A lock is a mechanical or electronic fastening device that is released by a physical object, by supplying secret information, by a combination thereof, or it may only be able to be opened from one side, such as a door chain.

Laptop theft is a significant threat to users of laptop and netbook computers. Many methods to protect the data and to prevent theft have been developed, including alarms, laptop locks, and visual deterrents such as stickers or labels. Victims of laptop theft can lose hardware, software, and essential data that has not been backed up. Thieves also may have access to sensitive data and personal information. Some systems authorize access based on credentials stored on the laptop including MAC addresses, web cookies, cryptographic keys and stored passwords.

<span class="mw-page-title-main">Bank vault</span> Secure space where valuable items are stored

A bank vault is a secure space where money, valuables, records, and documents are stored. It is intended to protect their contents from theft, unauthorized use, fire, natural disasters, and other threats, much like a safe. Unlike safes, vaults are an integral part of the building within which they are built, using armored walls and a tightly fashioned door closed with a complex lock.

<span class="mw-page-title-main">Computer case</span> Enclosure that contains most of the computer hardware

A computer case, also known as a computer chassis, is the enclosure that contains most of the hardware of a personal computer. The components housed inside the case are referred as the internal hardware, while hardware outside the case are known as peripherals.

<span class="mw-page-title-main">Safe-cracking</span> Process of opening a safe without either the combination or the key

Safe-cracking is the process of opening a safe without either the combination or the key.

Anti-theft systems protect valuables such as vehicles and personal property like wallets, phones, and jewelry. They are also used in retail settings to protect merchandise in the form of security tags and labels. Anti-theft systems include devices such as locks and keys, RFID tags, and GPS locators.

<span class="mw-page-title-main">Padlock</span> Portable locks with a shackle that may be passed through an opening

Padlocks are portable locks usually with a shackle that may be passed through an opening to prevent use, theft, vandalism or harm.

<span class="mw-page-title-main">Car key</span> Key used to open and/or start an automobile

A car key or an automobile key is a key used to open and/or start an automobile. Modern key designs are usually symmetrical, and some use grooves on both sides, rather than a cut edge, to actuate the lock. It has multiple uses for the automobile with which it was sold. A car key can open the doors, as well as start the ignition, open the glove compartment and also open the trunk (boot) of the car. Some cars come with an additional key known as a valet key that starts the ignition and opens the driver's side door, but prevents the valet from gaining access to valuables that are located in the trunk or the glove box. Some valet keys, particularly those to high-performance vehicles, go so far as to restrict the engine's power output to prevent joyriding. Recently, features such as coded immobilizers have been implemented in newer vehicles. More sophisticated systems make ignition dependent on electronic devices, rather than the mechanical keyswitch. A number of these systems, such as KeeLoq and Megamos Crypto have been demonstrated to be weak and vulnerable to cryptanalytic attacks.

<span class="mw-page-title-main">Remote keyless system</span> Electronic lock without a mechanical key

A remote keyless system (RKS), also known as remote keyless entry (RKE) or remote central locking, is an electronic lock that controls access to a building or vehicle by using an electronic remote control (activated by a handheld device or automatically by proximity). RKS largely and quickly superseded keyless entry, a budding technology that restrictively bound locking and locking functions to vehicle-mounted keypads.

<span class="mw-page-title-main">Immobiliser</span> Motor vehicle anti-theft device

An immobiliser or immobilizer is an electronic security device fitted to a motor vehicle that prevents the engine from being started unless the correct key is present. This prevents the vehicle from being "hot wired" after entry has been achieved and thus reduces motor vehicle theft. Research shows that the uniform application of immobilisers reduced the rate of car theft by 40%.

Physical information security is the intersection, the common ground between physical security and information security. It primarily concerns the protection of tangible information-related assets such as computer systems and storage media against physical, real-world threats such as unauthorized physical access, theft, fire and flood. It typically involves physical controls such as protective barriers and locks, uninterruptible power supplies, and shredders. Information security controls in the physical domain complement those in the logical domain, and procedural or administrative controls.

<span class="mw-page-title-main">Gun safe</span> Safe for storing firearms

A gun safe is a safe designed for storing one or more firearms and/or ammunitions. Gun safes are primarily used to prevent access by unauthorized or unqualified persons, for burglary protection and, in more capable safes, to protect the contents from damage by flood, fire or other natural disasters.

<span class="mw-page-title-main">Computer keyboard</span> Data input device

A computer keyboard is a peripheral input device modeled after the typewriter keyboard which uses an arrangement of buttons or keys to act as mechanical levers or electronic switches. Replacing early punched cards and paper tape technology, interaction via teleprinter-style keyboards have been the main input method for computers since the 1970s, supplemented by the computer mouse since the 1980s.

Automotive hacking is the exploitation of vulnerabilities within the software, hardware, and communication systems of automobiles.

<span class="mw-page-title-main">Key duplication</span>

Key duplication refers to the process of creating a key based on an existing key. Key cutting is the primary method of key duplication: a flat key is fitted into a vise in a machine, with a blank attached to a parallel vise, and the original key is moved along a guide, while the blank is moved against a blade, which cuts it. After cutting, the new key is deburred: scrubbed with a wire brush, either built into the machine, or in a bench grinder, to remove burrs which, were they not removed, would be dangerously sharp and, further, foul locks.

Maclocks are a line of computer security lock and display products that focuses on security for Apple products. The brand was first released in 1986 and is manufactured by Compulocks.

References

  1. "The Turbo Button And The Key Lock On Old Computers". Francis Universe. 7 October 2017. Retrieved 2 December 2019.
  2. Bookwalter, J. R. "Maclocks Grip and Dock iPad Security Stand review: Rugged iPad convenience". MacWorld. Retrieved 11 August 2021.
  3. Basinger, Clint. "Why did old PCs have key locks?". YouTube. Retrieved 2 December 2019.