Security Built-In In today's world, any website – even well-known, legitimate ones – may be infected with malware. Just by visiting an infected web page, ordinary computers can get infected as well. Malware can exploit flaws in your browser to steal passwords, company data, and financial information. It happens to millions of people without their knowledge. Chromebooks use the first operating system designed with this ongoing threat in mind. It uses the principle of “defense in depth” to provide multiple layers of protection, so if any one layer is bypassed, others are still in effect. So while it's still important to take precautions to protect your data, Chromebooks let you breathe just a little bit easier.

Automatic Updates The most effective way to protect against malware is to make sure all software is up to date and has the latest security fixes. This can be difficult to manage on traditional operating systems with many software components from many vendors all with different update mechanisms and user interfaces. Chromebooks manage updates automatically so Chromebooks are always running the latest and most secure version.

Sandboxing On a Chromebook, each web page and application runs in a restricted environment called a “sandbox”. So if the Chromebook is directed to an infected page, it can't affect the other tabs or apps on the computer, or anything else on the machine. The threat is contained.

Verified Boot Even if malware manages to escape the sandbox, the Chromebook is still protected. Every time the Chromebook starts up, it does a self check called Verified Boot. If it detects that the system has been tampered with, or corrupted in any way, typically it will repair itself without any effort, taking the Chromebook back to an operating system that’s as good as new.

Data Encryption When using web apps on a Chromebook, all important data is stored safely in the cloud. Certain kinds of files, like downloads, cookies, and browser cache files, may still be present on the computer. The Chromebook encrypts all this data using tamper-resistant hardware, making it very difficult for anyone to access those files.

Recovery If anything goes wrong with your Chromebook, you can simply push a button to enter the hardware-backed recovery mode and restore the operating system to a known good version.

 

Security Built-In

financial information. It happens to millions of ... systems with many software components from many vendors all with different update mechanisms and user ...

519KB Sizes 0 Downloads 177 Views

Recommend Documents

Enhance Security and Usability Security and Usability Security and ...
Even though graphical passwords are difficult to guess and break, if someone direct observe during the password enter sessions, he/she probably figure out the password by guessing it randomly. Nevertheless, the issue of how to design the authenticati

The Psychology of Security - Schneier on Security
This means that, as a successful species on the planet, humans should be really good at ... A lot of this can be chalked up to bad information or bad mathematics .... as modern human society, technology, and the media. And, even worse, they ...

The Psychology of Security - Schneier on Security
Behavioral economics looks at human biases—emotional, social, and ..... as modern human society, technology, and the media. And, even worse, they can be made to fail by others—politicians, marketers, and so on—who exploit our ..... some commute

Information Security and Acceptable Use Security Policy.pdf ...
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. Information ...

Listing of Security of Security and Intelligence Services (India ... - NSE
Aug 8, 2017 - Members of the Exchange are hereby informed about the forthcoming listing of security (ies) on the. Exchange as follows: Name of the ...

Network Security and Storage Security: Symmetries ...
application of network-oriented solutions. ... of data, or network communication, and the timeshifting of data, or storage. ..... scribing to a data service. The link ...

Information Security and Acceptable Use Security Policy.pdf ...
Page 2 of 15. Published 6/30/2016 2. Information Security Office. Education - Partnership - Solutions. District organizational expectations for responsible use of ...

pdf-44\bundle-comptia-security-guide-to-network-security ...
... from Indiana State University. Page 3 of 7. pdf-44\bundle-comptia-security-guide-to-network-sec ... bs-2-terms-12-months-access-code-by-mark-ciampa.pdf.