PRACTICAL ASPECTS OF ORGANIZING USER PROCESSES FOR PUBLIC ACCESS WORKSTATIONS

Authors

DOI:

https://doi.org/10.32689/maup.it.2022.4.1

Keywords:

user, access, local network, user mode, confidentiality, system administrator

Abstract

When administering local area networks, a special class of tasks is distinguished, where the administered local network has the so-called "public access" workstations (PAWS). The purpose of the article is to analyze and solve practical issues of organizing user processes for public access workstations, the work of which allows to increase the efficiency of information systems in general. The work of such stations is analyzed from the point of view of practical organization of user processes. Scientific novelty. Approaches to the organization of PAWS are analyzed and three main ones are formed. The first (autonomous type) is extremely rarely designed from scratch. Here, usually, the design at the implementation stage is reduced to the choice of a typical hardware and software solution (hardware configuration, type of operating system), which serves as a platform for the operator's workstation software. The second approach is when operators are encouraged to bring their own workstations with them, subject to restrictions that regulate what the user can bring. The third is a "hybrid" approach that combines the first and second approaches. The problems of autonomous type PAWSare analyzed. Different approaches to solving the problems of autonomous type PAWS are presented. The custom approach generates much more problems than it solves. Flash drives very quickly turn into carriers and distributors of malicious software. From the point of view of a system administrator, there are several ways to solve the problem of PAWS: using an LDAP system, installing additional software that performs the functions of both ensuring security and denying access to the settings and resources of the operating system, replacing the operating system. Practical recommendations are given for the transfer of flash drives to the platform with open software. As a conclusion, the article emphasizes the necessity of transferring the PCSD to the platform with open software, given the serious problems with confidentiality, the problem of "broken windows".

References

Rastogi U. Computer Network And Its Consequences – A Literature Survey. International Journal of Health, Education & Social (IJHES). 2019. Vol. 2, no. 11. P. 5–19.

Wang Y., Liu Y., Cui W., Tang J., Zhang H., Walston D., Zhang D. Returning to the Office During the COVID-19 Pandemic Recovery: Early Indicators from China / Extended Abstracts of the 2021 CHI Conference on Human Factors in Computing Systems. ACM, 2021.

Parker L. D. The COVID-19 office in transition: cost, efficiency and the social responsibility business case. Accounting, Auditing and Accountability Journal. Emerald, 2020. Vol. 33, no. 8. P. 1943–1967.

Matisāne L., Paegle L., Akūlova L., Vanadziņš I. Challenges for Workplace Risk Assessment in Home Offices-Results from a Qualitative Descriptive Study on Working Life during the First Wave of the COVID-19 Pandemic in Latvia. International Journal of Environmental Research and Public Health. 2021. Vol. 18, no. 20. P. 1–19.

Barzashka I. Are Cyber-Weapons Effective? Assessing Stuxnet’s Impact on the Iranian Enrichment Programme. The RUSI Journal. Taylor & Francis. 2013. Vol. 158, no. 2. P. 48–56.

What is BYOD? | IBM. URL: https://www.ibm.com/topics/byod (дата звернення: 2023-01-10).

Wani T. A., Mendoza A., Gray K., Smolenaers F. Status of bring-your-own-device (BYOD) security practices in Australian hospitals A national survey. Health Policy and Technology. Elsevier BV, 2022. Vol. 11, no. 3. P. 100627.

5 Kiosk Security Strategies That Businesses Should Know. URL: https://blog.scalefusion.com/strategies-to-secureyour-public-facing-kiosks/ (дата звернення: 2023-01-10).

Cyber attack threats to kiosks. URL: https://www.sourcesecurity.com/insights/self-service-kiosks-target-cyberattacks-physical-security-co-1540547340-ga.1543319929.html (дата звернення: 2023-01-10).

Olalere M., Abdullah M. T., Mahmod R., Abdullah A. A Review of Bring Your Own Device on Security Issues. SAGE Open. SAGE Publications, 2015. Vol. 5, no. 2. P. 215824401558037.

Disterer G., Kleiner C. BYOD Bring Your Own Device // Procedia Technology. Elsevier BV, 2013. Vol. 9. P. 43–53.

Blizzard S. Coming full circle: are there benefits to BYOD? Computer Fraud and Security. Mark Allen Group, 2015. Vol. 2015, no. 2. P. 18–20.

Report: Microsoft makes it difficult to create local accounts in Windows 10. URL: https://www.ghacks.net/2019/09/30/report-microsoft-makes-it-difficult-to-create-local-accounts-in-windows-10/ (дата звернення: 2023-01-11).

How (and Why) to Create a Separate Windows Account Just for School | PCMag. URL: https://www.pcmag.com/howto/how-and-why-to-create-a-separate-windows-account-just-for-school (дата звернення: 2023-01-11).

Both D. Working As Root // Using and Administering Linux: Volume 1. Apress, 2019. P. 283–307.

The 21 worst tech habits – and how to break them – ARN. URL: https://www.arnnet.com.au/article/459900/21_worst_tech_habits_-_how_break_them/?fp=2&fpid=2 (дата звернення: 2023-01-11).

Wilson J. Q., Kelling G. L. “Broken Windows”: Atlantic Monthly (1982). The city reader. Routledge, 2011. P. 309–319.

HARCOURT B. E., LUDWIG J. Reefer madness: broken windows policing and misdemeanor marijuana arrests in New York city, 1989–2000. Criminology and Public Policy. Wiley, 2007. Vol. 6, no. 1. P. 165–181.

Ito E., Kasahara Y., Fujimura N. Implementation and operation of the Kyushu university authentication system. Proceedings of the 41st annual ACM SIGUCCS conference on User services. ACM, 2013.

Published

2023-04-06

How to Cite

БОЙКО, В., ВАСИЛЕНКО, М., & СЛАТВІНСЬКА, В. (2023). PRACTICAL ASPECTS OF ORGANIZING USER PROCESSES FOR PUBLIC ACCESS WORKSTATIONS. Information Technology and Society, (4 (6), 6-13. https://doi.org/10.32689/maup.it.2022.4.1

Most read articles by the same author(s)