PC Security should be multi-layered in order to provide the best defense. Securing the hardware is one important aspect in that multi-layered approach. Items such as security cables, security tokens, biometrics, disk encryption, and even chip-based technologies, such as secure processors, all provide layers of protection for computing devices.
Discuss the following questions:
- What benefits do various hardware security methods offer?
- What drawbacks can they impose?
- Which method, or combination of methods, would you recommend to be implemented at a medium-sized business and why?
Cite at least one trusted resource.