We are independent & ad-supported. We may earn a commission for purchases made through our links.
Advertiser Disclosure
Our website is an independent, advertising-supported platform. We provide our content free of charge to our readers, and to keep it that way, we rely on revenue generated through advertisements and affiliate partnerships. This means that when you click on certain links on our site and make a purchase, we may earn a commission. Learn more.
How We Make Money
We sustain our operations through affiliate commissions and advertising. If you click on an affiliate link and make a purchase, we may receive a commission from the merchant at no additional cost to you. We also display advertisements on our website, which help generate revenue to support our work and keep our content free for readers. Our editorial team operates independently of our advertising and affiliate partnerships to ensure that our content remains unbiased and focused on providing you with the best information and recommendations based on thorough research and honest evaluations. To remain transparent, we’ve provided a list of our current affiliate partners here.
Internet

Our Promise to you

Founded in 2002, our company has been a trusted resource for readers seeking informative and engaging content. Our dedication to quality remains unwavering—and will never change. We follow a strict editorial policy, ensuring that our content is authored by highly qualified professionals and edited by subject matter experts. This guarantees that everything we publish is objective, accurate, and trustworthy.

Over the years, we've refined our approach to cover a wide range of topics, providing readers with reliable and practical advice to enhance their knowledge and skills. That's why millions of readers turn to us each year. Join us in celebrating the joy of learning, guided by standards you can trust.

What Are the Best Tips for Public Computer Security?

By Eugene P.
Updated: May 17, 2024
Views: 3,803
Share

It can be difficult to manage public computer security, especially at terminals that are used regularly for a diverse range of tasks. It is possible, however, to prevent damage to the computers, loss of data and malicious intrusions while still permitting access to rule-abiding members of the public. The first is to use every trick possible to protect the core operating system, from booting from a compact disk (CD) or external drive to creating virtual computers on a single system. Another tip is to find security software that can either restrict user access to programs and features or to install software that resets the computer to an initial state after each use. Finally, maintaining logs of activity can help to show if a single user is consistently testing a system or finding ways to violate policies.

One of the best tips for maintaining public computer security is to protect the operating system from malicious attacks or modifications. This can be achieved by booting computers from a live CD. A live CD is a complete operating system on a CD that cannot be modified. It also means that no information, such as deleted files or cache files, can be extracted from a stolen hard drive.

When a computer is being used every day by many people, then another type of public computer security could be helpful. This comes in the form of software that can section off a piece of the operating system and create a safe sandbox where the user can do no permanent harm to a system and will not have access to the larger computer and its resources. These virtual computer programs will actually create a copy of the operating system that is only used for the one session in which the user is working and will then delete all traces of anything done when the user logs off. This both protects the computer and hides nearly all information on the hard drive.

A regular examination of system log files can help in preventing future problems with public computer security by finding patterns of attempted violations. If a computer shows a sequence of failed access attempts or browsing of the file system, even if it is empty or protected, then more stringent security procedures can be enacted on that system. For public computers that have individual logins, this information can be traced back to specific users.

Finally, physical public computer security should not be overlooked. This means the computer itself should be somehow secured to its location. In addition, the case that contains important components such as the motherboard, network interface card or hard drive should be locked or made inaccessible by the public. This can prevent a malicious person from stealing a hard drive and then recovering any sensitive information that might have once been stored on it.

Share
WiseGeek is dedicated to providing accurate and trustworthy information. We carefully select reputable sources and employ a rigorous fact-checking process to maintain the highest standards. To learn more about our commitment to accuracy, read our editorial process.

Editors' Picks

Discussion Comments
Share
https://www.wisegeek.net/what-are-the-best-tips-for-public-computer-security.htm
Copy this link
WiseGeek, in your inbox

Our latest articles, guides, and more, delivered daily.

WiseGeek, in your inbox

Our latest articles, guides, and more, delivered daily.