A computer security environment that delays physical access to a computer system, detects intrusion attempts upon that computer system, using one or more intrusion sensors that each detects an intrusion condition, and finally destroys nonvolatile memory within the computer system to deny access to sensitive data stored within the nonvolatile memory upon detection of an intrusion. The system supports selection of an intrusion profile defining the intrusion conditions armed to detect an intrusion and destroy the nonvolatile memory.
展开▼