• There is no such thing as perfect security in any context, whether physical or data. All you can do is make it dificult for the less sophisticated bad guys. Then make sure that you at least can detect who has stolen / sabotaged what by having robust audit trails and alarms (eg access pattern matching).