• Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint

Summary

In this chapter, we looked at several of the major operating systems used in the home environment. We also looked at some of the basic steps you can take to secure those systems. Keeping your home system secure can essentially be addressed by performing two major actions.

First, you must take the initial installation and configuration of the machine and secure it properly. Just because a machine has been bought at a store and has the operating system preloaded doesn't mean it is also properly secured. You must take the basic steps of configuring and double-checking the initial configuration of your new machine. Manufacturers often ship their machines or software with poor default settings. An example might be preinstalled software that does not include adequate password settings or no passwords at all to control access. There is no way to really hold manufacturers accountable for weak security. No cases have been successfully tried against a manufacturer for weak security in its product. Because users can't force good security on a manufacturer other than by not buying a product, the speed at which the manufacturer changes a product is directly related to consumers' purchases.


PREVIEW

                                                                          

Not a subscriber?

Start A Free Trial


  
  • Creative Edge
  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint