Importance Of Controlling Access To Hardware