Establishing Good Security Practices

Security is important for your Tablet PC especially because it's possible for intruders to tap into your Tablet PC wirelessly. If you turn off wireless networking and don't have your network cable connected, you're safe from data thieves as long as your machine is in your possession.

Note

graphics/nman.gif

As you read this chapter, you may begin to wonder whether I'm a paranoid user. Maybe I am, but I want you to know how to protect yourself from intrusion and ignorance. There are many things you can do to protect yourself; all of them should be evaluated for your level of risk and the importance of your data.


If you let the machine out of your sight, however, others could access your files. That's when you want other levels of security. This section will help you establish safe computing practices and help you lock down your computer as much as practical. You can certainly take serious measures to protect your machine, but for most users, these protection schemes can get in the way of getting work done. The protection scheme you choose depends on your ability to accept risk, and the sensitivity of your data.

User Accounts and Passwords

The first thing you need to do to protect your Tablet PC is to establish user accounts for those who will use the machine. (Note that it's possible that user accounts were set up before you received your machine.)

Note

graphics/nman.gif

Although I cover many aspects of security here, you should not assume that I have covered everything. Depending on your level of risk tolerance and willingness to pay for expertise, I recommend that you consult an IT professional about your specific security needs.


To get to the user account setup, go to the Control Panel, then choose User Accounts. In the User Accounts dialog box that appears, you will see a list of current users, as shown in Figure 11.1.

Figure 11.1. The list of user accounts on my machine.

graphics/11fig01.gif

In the list, you see Administrator, which is a system account that cannot be changed. You also see my login, CMATHEWS. Notice also that there are two different domains. The CMATHEWS domain is just the local computer; the MCKIMCREED domain is the domain I log on to at work. A domain is a trusted security grouping that recognizes users by username and password. If your computer is not part of a work domain, you will probably want to have just two users, Administrator and your username. The domain will just be the name of your computer.

To add a user, simply click the Add button and follow the prompts. If you intend to add multiple users, you may want to establish groups. To do this, tap on the Advanced tab and then tap the Advanced button to open the Local Users and Groups window, as shown in Figure 11.2. This window displays a list of all your named users. Guest is disabled, as denoted by the circled X.

Figure 11.2. A more in-depth look at the user accounts on my machine.

graphics/11fig02.gif

To boost security, make sure that the Guest user is disabled and that the Administrator user has a unique password (unless your IT department set it up for you, in which case you will want to ask them how your security is configured). To disable the Guest account, double-click the Guest username and check the Disable account check box. Leaving the guest account enabled is a potential security hazard.

Caution

graphics/cman.gif

Always disable the Guest user account. In fact, any accounts that you are not sure of are suspect. If yours is a company-owned machine, check with your IT department about how to secure your machine within the company's parameters. If not, limit the number of accounts you have set up on your machine and make sure each has a secure password.


Requiring Ctrl+Alt+Delete for Secure Logins

To configure your Tablet PC to require users to log in securely, again open the User Accounts dialog box (choose User Accounts from the Control Panel), but this time tap the Advanced tab. There, tap the Require users to press Ctrl+Alt+Delete check box; this will require a secure login, which users perform by pressing you guessed it Ctrl+Alt+Delete. Any time people log into your Tablet PC, they will then need to press Ctrl+Alt+Delete to log in.

Require Login When Returning from a Power-Saving Mode

In addition to configuring your Tablet PC to require users to log in securely, it's a good idea set up your machine to require a login every time it boots, returns from hibernation and standby, and resumes from a screensaver. This will prevent anyone without the proper credentials from getting into your machine easily.

Caution

graphics/cman.gif

If you don't set up password recovery from standby or hibernation mode, all your other security measures can be compromised from a person sitting down in front of your machine while you're away.


Establishing good usernames and passwords is important. Making sure that passwords are required is the next step. If you allow your Tablet PC to return from standby or hibernate mode without asking for a password, it can be easy for someone to access your machine.

To require a password when returning from standby or hibernation, do the following:

  1. Open the Control Panel and choose Power Options.

  2. Click the Advanced tab.

  3. Check the Prompt for password when computer returns from standby check box.

Require Login When Returning from Screensaver

You also have potential security risks when you walk away from your machine for a while. You can make your screensaver require a login when resuming from the screen saver. If you're away long enough for your screensaver to kick in, it's long enough for someone else to gain access to your machine.

Tip

graphics/tman.gif

Setting up your Tablet PC to require a password when you return from the screensaver is important; otherwise, people can get access to your machine while you're away from it.


To establish this policy, open the Control Panel and choose Display Properties. Click on the Screensaver tab, and check the On resume, password protect check box.

Install and Configure Virus Protection

Virus protection is an important safety precaution if you think you'll ever connect to the Internet or a network (which is a big reason for getting the Tablet PC in the first place). Basically, you need it.

There are numerous virus-protection packages available, including Symantec's Norton Antivirus, McAfee's VirusScan, and packages by Computer Associates and Trend Micro. McAfee and Symantec have the largest installed bases and are always excellent choices.

Install the software according to the instructions provided with your package. Usually, accepting the defaults will yield a reasonable protection level. When you first install the application, you will probably be required to scan your hard drive before doing anything else. After that, you can configure your anti-virus product to scan on a regular basis, such as once a week, and also to protect in real-time, checking all files coming into your computer.

Caution

graphics/cman.gif

In today's world, if you're not protected from viruses and you share information with anyone else, you are opening yourself up for a world of hurt. Install virus protection software as soon as possible.


If your Tablet PC is company-owned, your IT staff may have already set up virus protection for you. Ask them how often the virus definitions get updated. If it's any less than a month or week, ask if they can make it more frequent. I have my company's virus files updated daily.

Use a Firewall to Protect Against Internet Attacks

If you're using your Internet connection for multiple users, you will want to purchase a firewall device. These are inexpensive, and can be purchased in a multipurpose device, such as a wireless broadband router/firewall/switch combination. If you're setting up a network at home to include wireless access to the Internet, I'd encourage you to purchase and configure one of these devices. If you don't have a firewall at work, put this book down and go get one right now. Seriously.

Caution

graphics/cman.gif

Firewalls are important for anyone using the Internet. If you leave yourself open, there are just too many ways malevolent people can get control of your machine.


You could purchase any one of probably a hundred or so different firewall products. I have used both the Linksys and D-Link broadband router/firewall/switch combos, and have been pleased with each. The amount of security you need will determine your device requirements.

If you plan to create a wireless network, refer to Chapter 10, "Wireless Networking," for more information on what to buy and how it should be configured.

Enabling Internet Connection Firewall

If you're only going to have your Tablet PC connected to the Internet (and not multiple machines), you don't have to have the hardware-based firewall, even though I recommend it. Windows XP includes the Internet Connection Firewall (ICF) as an option. Using this, you can protect your machine at a basic level against data thieves and other miscreants. Internet Connection Firewall prevents others from coming through the Internet and getting on your computer.

Tip

graphics/tman.gif

Use Internet Connection Firewall only if you don't have a hardware-based firewall. ICF takes up computing resources and can interfere with other applications.


The Internet Connection Firewall can slow down your system and interfere with other services on your Tablet PC, but it is an option for those who don't want to buy a firewall device.

To enable the ICF, do the following:

  1. Choose Network Connections from the Control Panel, or double-click the Network Places icon on your desktop and then choose View network connections.

  2. Choose the connection that you want to protect (dial-up, wireless, or LAN are the most common choices). The shortcuts window on the left will then show several options, as shown in Figure 11.3.

    Figure 11.3. The Network Connections view.

    graphics/11fig03.gif

  3. Tap Change settings of this connection.

  4. Tap the Advanced tab.

  5. As shown in Figure 11.4, check the check box at the top to enable Internet Connection Firewall.

    Figure 11.4. Check the Protect my computer and network... check box to enable the ICF.

    graphics/11fig04.gif

If you find that enabling ICF interferes with anything you need to do, you can follow the same procedure, but uncheck the check box to disable ICF.

For more information on ICF, enter the phrase "Internet Connection Firewall" into Help and Support (Start, Help and Support). The Internet Connection Firewall overview explains what ICF is, and how it works. It also details issues that you may need to be aware of when enabling ICF on your system, such as possible contention with Internet Connection Sharing (ICS) and not enabling it if not connected directly to the Internet. Because this book deals more with the Tablet PC than Windows XP, you may want to find a good Windows XP book for information on items like this.

Setting Up File and Folder Security

File and folder security allows you to establish even greater control over what files are protected. If you have particularly sensitive files, you will want a firewall, antivirus program, sign-on accounts and passwords, and file-level security.

Folder- and file-level security is only available on NTFS-partitioned drives. Many Tablet PCs have FAT32 partitions, while others will have NTFS. NTFS is a more secure and higher-performing partitioning method than FAT32. You can convert from FAT32 to NTFS easily, but you cannot readily go back to FAT32.

To convert your C: drive to NTFS, you can do the following:

  1. Make sure you want to convert. You cannot go back to FAT32 without significant effort.

  2. Back up your system in case there is a problem.

  3. Tap Start, then Run.

  4. In the dialog box that opens, type convert c: /fs:ntfs and tap OK.

Caution

graphics/cman.gif

For most people, setting up file- and folder-level security is not necessary. Use this only if you need to protect particular data from others, as it could make it more difficult for you to gain access to files at some point.


The process may take quite a bit of time, depending on the size of your hard drive and the amount of data you have.

To establish file- or folder-level security, drill down in My Computer or Windows Explorer to the folder or file on which you want to establish higher security. Then right-click the folder or file and choose Sharing and Security, as shown in Figure 11.5.

Figure 11.5. To enable folder-level security, right-click the folder you want to add security to and choose Sharing and Security.

graphics/11fig05.jpg

After you do that, you will see the Folder Properties dialog box (where Folder is the name of the folder). Click on the Security tab, and you will see something similar to what is shown in Figure 11.6.

Figure 11.6. Reduce the groups and users to the fewest who need access to your files. This is only available on NTFS-partitioned drives.

graphics/11fig06.gif

Notice that only a few of my users and groups can access this folder. I could further reduce the number of potential users by eliminating all but my account. This could be problematic, though, if my account was re-created or destroyed for some reason.

The main thing to keep in mind here is that if you want your files secure, you need to limit access to only those who need access, and no more. Likely, this will be just you. You (or your network administrator, if you are using your firm's Tablet PC) will need to determine whether you want the administrator to access your folder(s). You probably will, but if you do, make sure that the administrator password is secure.

File and folder security can be implemented on everything you have on your machine, but I would recommend you take other precautions before going to this extreme. I basically allow myself and the administrator to have rights to my system, and I have control over both accounts. Of course, I'm also in charge of IT in my company.

If you get a message that you cannot remove a user or group because "this object is inheriting permissions from its parent," you can get around this by clicking on the Advanced button on Folder Properties dialog box's Security tab, and then deselecting the first check box.

You may want to refer to a more in-depth Windows XP book for more information on file and folder security. Alternatively, you might want to speak with someone in the IT field who can help you with your specific data-protection needs.

Disable Folder Sharing

When your computer comes to you, it will probably have drive and folder sharing enabled. If it does, all it takes is one person knowing that he or she can access your hard drive by using the \\computername\c$ access method to thwart your other security measures.

The easiest way to remove folder sharing is to do the following:

  1. Open My Computer.

  2. Right-click the C: drive and choose Sharing and Security.

  3. Click on the Do not share this folder option button to select it.

Caution

graphics/cman.gif

If you don't remove the administrative share on your hard drive, you will automatically allow anyone with a proper username and password to access your entire hard drive. Protect yourself and remove this share.


Before you performed step 3, did you notice that your C: drive was shared as C$? This is an administrative share that most people don't know about, but that is easily compromised.

You can certainly choose to share any folder that you want on your machine, but I'd recommend making it a folder that you're sharing, and not the entire drive.



Absolute Beginner's Guide to Tablet PCs
Absolute Beginners Guide to Tablet PCs
ISBN: 0789730499
EAN: 2147483647
Year: 2003
Pages: 172

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net