Got a free Chromebook - true/false no need for anti-virus?

  • Thread starter Thread starter kyphysics
  • Start date Start date
Click For Summary

Discussion Overview

The discussion centers around the security of Chromebooks, specifically addressing whether antivirus software is necessary for these devices. Participants explore the inherent security features of Chromebooks, such as sandboxing, and the potential risks of malware, while also considering user experiences and preferences regarding antivirus solutions.

Discussion Character

  • Debate/contested
  • Technical explanation
  • Conceptual clarification

Main Points Raised

  • Some participants assert that Chromebooks have stronger defenses against malware due to features like sandboxing and a limited application environment.
  • Others argue that despite the security features, the presence of rare malware still poses a risk, questioning the sufficiency of built-in protections.
  • A few participants advocate for always using antivirus software, citing the need for peace of mind and the potential for personal information theft.
  • Some express skepticism about the effectiveness of antivirus software, suggesting that it may not provide real security and could create false confidence.
  • Participants mention the availability of free antivirus programs, noting that they can be useful but may come with upselling tactics.
  • There is discussion about the operational limitations of antivirus software on Chromebooks, including the need for special privileges that may compromise security.
  • Questions arise regarding the ability to download and run applications on Chromebooks, with some participants clarifying that Android apps can be used.
  • Concerns are raised about the Single-Sign On (SSO) feature of Chromebooks, which links device and Google account passwords, potentially compromising personal security policies.

Areas of Agreement / Disagreement

Participants do not reach a consensus on the necessity of antivirus software for Chromebooks. There are multiple competing views regarding the effectiveness of built-in security features versus the need for additional protection.

Contextual Notes

Some participants express uncertainty about the implications of using antivirus software on Chromebooks and the potential for it to introduce vulnerabilities. The discussion also highlights varying personal security policies and preferences among users.

  • #31
DrClaude said:
For those of us who worked with computers before the Internet, this sounds extremely naïve!
Where security is the top priority, complete disconnection from the internet is the usual policy. And yes, it really is a pain.
Any method of exchanging information with other computers, including floppy disks and thumb drives, poses an infection risk.
The permission to put new software/data on a computer system can be restricted to system administrators. They can follow procedures that include scanning the incoming software/data on an unclassified computer before it is moved onto the classified system.

PS. Although this level of security can be achieved, it is still not perfect and it is not practical except in the most extreme cases.
 
  • Informative
Likes   Reactions: Janosh89
Computer science news on Phys.org
  • #32
I thought it was a prerequisite of computer security that bad guys have no physical access to the machines.

Of course that leaves the risk of insider actions, but even those can be restricted. One facility I saw put a dab of concrete in all USB ports to assure they would never be used.

That is why upstream supply chain risks are so worrisome. If a bad guy has access to your hardware before you take delivery of it, how would you know?
 
  • Like
  • Informative
Likes   Reactions: Klystron and FactChecker
  • #34
We didn't use concrete, we had security seals and if one got broken (and we had to check them every day as part of the security audit at the end of the day) everyone who walked into that room during the day got called back to be interrogated and it wasn't pretty, clearances and employment status were in jeopardy.

And leave it to our best and brightest aerospace engineers and rocket scientists to put super old games on a stand alone computer at a major research lab. That reminds me of the time I hacked together a script to mess with one of the guys. He typed on a keyboard like it was an IBM manual, I mean really hard, and he broke keyboards pretty regularly. So I wrote a script to open up a command prompt when he logged in and when he started typing the command prompt came to the from of the screen and yelled "OW, *** stop hitting me, that hurts". The good old days, I'd get fired for that now.
 
  • Like
Likes   Reactions: FactChecker
  • #35
Once you get to super secretive / national security stuff you can't just disconnect a computer from a network / internet and do nothing else, you have to secure the entire area. Theer are methods involving monitoring the power usage of the affected PC, picking up magnetic signals from the wires in the CPU, making the screen flicker in a way which is not noticable by humans but can be picked up by security camera's etc. A mobile phone near the computer can pick up these signals.

In a truly secure environment no mobiles or electronics devices with any sensors should get anywhere near the secure PC. In my last work place we had to leave our phones with security on arrival and collect them at the end of the day.
 
  • Like
Likes   Reactions: FactChecker

Similar threads

  • · Replies 17 ·
Replies
17
Views
16K
Replies
10
Views
5K