Star rating system for the physical security profile of your computer

In how to enhance the physical security posture of your PC, five physical security features were identified in that article. Here’s a summary of those features:

  1. Enable BIOS password
  2. Password-protect the bootloader
  3. Full disk encryption
  4. Use strong passwords
  5. Implement password aging

From this list comes the following star-rating system:

  • 5-star Paranoid rating * * * * * – all five features are enabled
  • 4-star Ultra Secured rating * * * * – steps 2 to 5 are enabled
  • 3-star Secured rating * * * – steps 3 to 5 are enabled
  • 2-star Weakly Secured rating * * – only steps 4 and 5 are used
  • 1-star Insecure rating * – auto login feature is enabled

Note that while this rating system is concerned with the physical security aspect, and not the network security aspect of your computer, some of the features in the list are not exclusive to physical security.

Related Posts

How to install Cinnamon 1.3.1 in Ubuntu 11.10 Cinnamon 1.3.1 is the latest version of Cinnamon, a new desktop environment forked from GNOME 3 by the developers of Linux Mint. Given the need for a ...
How to dual-boot Ubuntu 12.04 and Windows 7 One tool that has seen very little or no change over the past several releases in Ubuntu Desktop is the installation program. So it is somewhat surpri...
How to upgrade Ubuntu 14.10 kernel to version 3.17.1 Upgrading a distribution's kernel is something I tend to shy away from. There was a time, though, when recompiling the Linux kernel was fun. But that ...
How to install AppMenu-QML on Fedora 16 KDE There are several menu styles available for users of the K Desktop Environment. Virtually all, should be familiar with the Classic menu, the Kickoff m...
Bash susceptible to environment variables code injection attack A security adversary posted at Red Hat's security blog and referenced at US-CERT has warned users of the Bash shell of a "specially-crafted environmen...
How to add and manage users in Pear Linux 5 Creating and managing user accounts in Pear Linux 5 or any other desktop Linux distribution is a very simple task. This article touches on the differe...

We Recommend These Vendors and Free Offers

ContainerizeThis 2016 is a free, 2-day conference for all things containers and big data. Featured, will be presentations and free, hands-on workshops. Learn more at ContainerizeThis.com

Launch an SSD VPS in Europe, USA, Asia & Australia on Vultr's KVM-based Cloud platform starting at $5:00/month (15 GB SSD, 768 MB of RAM).

Deploy an SSD Cloud server in 55 seconds on DigitalOcean. Built for developers and starting at $5:00/month (20 GB SSD, 512 MB of RAM).

Want to become an expert ethical hacker and penetration tester? Request your free video training course of Online Penetration Testing and Ethical Hacking

Whether you're new to Linux or are a Linux guru, you can learn a lot more about the Linux kernel by requesting your free ebook of Linux Kernel In A Nutshell.


One Comment

  1. Great idea! Thanks, you have been a great help.

Leave a Comment

Your email address will not be published. Required fields are marked *

*