A Home User’s Security Checklist for Windows
نویسندگان
چکیده
The user and her desktop are widely held to be one of the weaker links in the security chain. By letting the user secure their own workstation by following a set of steps put forth in a checklist it could be possible to cover both problems at the same time. An already existing checklist was revised to become more concise. Twelve users took this checklist concerning the security posture of them and their workstations. It turned out that the majority of users largely used the default settings provided by the operating system. This is also an obvious trend at Microsoft, to make the default settings secure. It is reasonable to believe that this will be even truer in Windows Vista. Checklists are especially good as inspiration for interested users seeking to increase their knowledge on the subject.
منابع مشابه
Applying Security Configurations to a Large Number of Windows NT Computers Without Visiting Each Machine
Security administration in large Windows NT sites is a very challenging task. Windows NT’s environments has a reputation to be a system requiring hands-on administration, that is, it needs a manual by-hand work. It is necessary the administrator's physical presence in each one of the machines every time it needs to do some modification or configuration. This paper presents a case study of a cha...
متن کاملChallenges of the Digital Home in a Developing Economy
The Digital Home technology and standards are evolving towards an integrated electronic home system. This evolution will facilitate accessibility of data and information from various sources around the world to our home. The technology will also enable the automatic or semi-automatic control of lighting, climate doors and windows, and security, surveillance systems and control of other sundry d...
متن کاملA Design of Context aware Smart Home Safety Management using by Networked RFID and Sensor
Recently home intelligent service is extended to context aware and situation aware automation service by using ubiquitous technology. In this paper, we focused on user’s context based intelligent security management for home safety application using RFID and WSN(Wireless Sensor Network). We propose a context aware home safety application model. The proposed context service support security and ...
متن کاملEnabling Secure and Usable Mobile Application: Revealing the Nuts and Bolts of software TPM in todays Mobile Devices
The emergence of mobile applications to execute sensitive operations has brought a myriad of security threats to both enterprises and users. In order to benefit from the large potential in smartphones there is a need to manage the risks arising from threats, while maintaining an easy interface for the users. In this paper we investigate the use of Trusted Platform Model (TPM) 2.0 to develop a s...
متن کاملEasyVPN: IPsec Remote Access Made Easy
Telecommuting and access over a Wireless LAN require strong security at the network level. Although IPsec is well-suited for this task, it is difficult to configure and operate a large number of clients. To address this problem, we leverage the almost universal deployment and use of web browsers capable of SSL/TLS connections to web servers and the familiarity of users with such an interface. W...
متن کامل