Managing Public Computing · 53
Biggest Security Concern Additional Comments on Security.
Physical security (theft or vandalization).
Protecting public computers and library network from malicious
Protecting student information (e.g., papers, resumes, etc.
left on machines; forgetting to log off.) Machine and network
security (e.g., attempts to circumvent computer and network
protection measures.) Potentially illegal use of machines (e.g.,
child porn, file sharing of copyrighted material, e-mail threats to
individuals, identity theft.)
Currently, we use a combination of Active Directory Group
Policies and scripting to remove user information.
Security and some complaints from patrons about the use of
other patrons’ use of visiting Web sites that they may deem
Security breaches.
Security breaches for hardware, software and network attacks,
including unauthorized access for workstations which require
login id and password.
Inappropriate downloads from licensed resources.
Security/virus attack.
That someone will intentionally or unintentionally release
dangerous code onto the libraries’ network through a public
workstation or a public network connection.
That user information will be exposed or stolen. Tightening security is a constant part of desktop support.
That users might exploit security holes in installed software
Use of DeepFreeze has minimized security concerns; a
reboot restores the workstation to its original image.
The ability to install software. I have a philosophy of insecurity and view how insecure
we are.
Theft of components: mice, Internet cables, etc. PCs are locked down physically with cables and combo
locks. PCs are also locked down with software including
Windows Group Policy settings, DeepFreeze, use of a VPN,
and a library firewall system.
Theft of hardware.
Theft of personal information from users of public computers.
Theft of small peripheral devices.
Thefts and hacking.
Unauthenticated users sending harassing e-mails from library
public computers.
User’s data storage and e-mail. Unauthorized use of networked resources.
Previous Page Next Page