<s>
Kiosk	B-Application
software	I-Application
is	O
the	O
system	B-Application
and	O
user	B-Application
interface	I-Application
software	O
designed	O
for	O
an	O
interactive	O
kiosk	O
or	O
Internet	O
kiosk	O
enclosing	O
the	O
system	B-Application
in	O
a	O
way	O
that	O
prevents	O
user	O
interaction	O
and	O
activities	O
on	O
the	O
device	O
outside	O
the	O
scope	O
of	O
execution	O
of	O
the	O
software	O
.	O
</s>
<s>
This	O
way	O
,	O
the	O
system	B-Application
replaces	O
the	O
look	O
and	O
feel	O
of	O
the	O
system	B-Application
it	O
runs	O
over	O
,	O
allowing	O
for	O
customization	O
and	O
limited	O
offering	O
of	O
ad-hoc	O
services	O
.	O
</s>
<s>
Kiosk	B-Application
software	I-Application
locks	O
down	O
the	O
application	O
in	O
order	O
to	O
protect	O
the	O
kiosk	O
from	O
users	O
which	O
is	O
specially	O
relevant	O
under	O
,	O
but	O
not	O
only	O
limited	O
to	O
,	O
scenarios	O
where	O
the	O
device	O
is	O
publicly	O
accessed	O
such	O
libraries	O
,	O
vending	O
machines	O
or	O
public	O
transport	O
.	O
</s>
<s>
Kiosk	B-Application
software	I-Application
may	O
offer	O
remote	O
monitoring	O
to	O
manage	O
multiple	O
kiosks	O
from	O
another	O
location	O
.	O
</s>
<s>
Kiosk	B-Application
software	I-Application
is	O
used	O
to	O
manage	O
a	O
touchscreen	B-Device
,	O
allowing	O
users	O
to	O
touch	O
the	O
monitor	O
screen	O
to	O
make	O
selections	O
.	O
</s>
<s>
A	O
virtual	B-Device
keyboard	I-Device
eliminates	O
the	O
need	O
for	O
a	O
computer	B-Device
keyboard	I-Device
.	O
</s>
<s>
Kiosk	B-Application
system	I-Application
software	I-Application
addresses	O
security	O
by	O
deterring	O
users	O
from	O
maliciously	O
attacking	O
or	O
hacking	O
into	O
the	O
kiosk	O
.	O
</s>
<s>
Kiosk	B-Application
software	I-Application
must	O
be	O
able	O
to	O
prevent	O
misuse	O
of	O
the	O
provided	O
features	O
.	O
</s>
<s>
Kiosk	B-Application
software	I-Application
is	O
a	O
critical	O
component	O
to	O
protecting	O
public	O
facing	O
devices	O
from	O
hackers	O
,	O
inadvertent	O
misuse	O
,	O
and	O
unauthorized	O
access	O
.	O
</s>
<s>
Kiosk	B-Application
software	I-Application
has	O
the	O
facility	O
for	O
an	O
administrator	O
to	O
configure	O
the	O
software	O
to	O
suit	O
the	O
users	O
and	O
limit	O
user	O
behavior	O
.	O
</s>
<s>
Administrators	O
can	O
enable	O
or	O
disable	O
parts	O
of	O
the	O
kiosk	B-Application
software	I-Application
via	O
secure	O
log	O
in	O
.	O
</s>
<s>
It	O
is	O
critical	O
that	O
the	O
kiosk	B-Application
software	I-Application
prevent	O
the	O
user	O
from	O
ever	O
reaching	O
the	O
desktop	O
or	O
file	O
system	B-Application
.	O
</s>
<s>
This	O
type	O
of	O
security	O
can	O
be	O
difficult	O
because	O
standard	O
print	O
dialog	O
allows	O
the	O
content	O
to	O
be	O
printed	O
to	O
a	O
file	O
and	O
enable	O
the	O
user	O
access	O
to	O
the	O
file	O
system	B-Application
.	O
</s>
<s>
If	O
the	O
kiosk	O
includes	O
a	O
keyboard	B-Device
,	O
the	O
kiosk	B-Application
software	I-Application
must	O
also	O
disable	O
all	O
problematic	O
specialty	O
keys	O
and	O
keystroke	O
sequences	O
such	O
as	O
Control-Alt-Delete	B-Device
.	O
</s>
<s>
This	O
can	O
be	O
accomplished	O
by	O
hiding	O
the	O
address	O
bar	O
and	O
incorporating	O
domain	O
and	O
page	O
blocking	O
into	O
the	O
kiosk	B-Application
system	I-Application
software	I-Application
or	O
browser	O
lockdown	O
software	O
.	O
</s>
<s>
Custom	O
toolbars	O
and	O
navigation	O
options	O
are	O
often	O
a	O
feature	O
utilized	O
by	O
kiosk	B-Application
software	I-Application
.	O
</s>
<s>
Oftentimes	O
,	O
a	O
touch	B-Device
screen	I-Device
keyboard	B-Device
is	O
used	O
in	O
place	O
of	O
a	O
physical	O
keyboard	B-Device
.	O
</s>
<s>
The	O
touch	B-Device
screen	I-Device
"	O
virtual	O
"	O
keyboard	B-Device
is	O
often	O
built	O
into	O
the	O
kiosk	B-Application
software	I-Application
and	O
have	O
custom	O
design	O
options	O
.	O
</s>
<s>
One	O
critical	O
feature	O
of	O
kiosk	B-Application
software	I-Application
is	O
the	O
ability	O
to	O
clear	O
the	O
cache	O
,	O
user	O
history	O
and	O
data	O
between	O
uses	O
and	O
users	O
.	O
</s>
<s>
Another	O
critical	O
feature	O
of	O
kiosk	B-Application
software	I-Application
is	O
the	O
option	O
to	O
disable	O
USB	O
ports	O
and	O
other	O
external	O
access	O
.	O
</s>
<s>
This	O
feature	O
prevents	O
hacks	O
such	O
as	O
that	O
of	O
the	O
Brinks	O
Safe	O
Hack	O
,	O
where	O
hackers	O
accessed	O
the	O
operating	O
system	B-Application
of	O
a	O
Brinks	O
Safe	O
,	O
unlocking	O
the	O
safe	O
and	O
providing	O
access	O
to	O
the	O
critical	O
financial	O
information	O
on	O
the	O
PC	O
.	O
</s>
<s>
Kiosk	B-Application
software	I-Application
is	O
available	O
for	O
most	O
all	O
operating	O
systems	O
:	O
Windows	O
,	O
ChromeOS	B-Operating_System
,	O
Android	B-Application
,	O
iOS	B-Application
,	O
Linux	B-Application
,	O
etc	O
.	O
</s>
<s>
It	O
also	O
can	O
be	O
found	O
to	O
support	O
various	O
browsers	O
,	O
most	O
commonly	O
Internet	B-Application
Explorer	I-Application
,	O
Safari	B-Application
,	O
Firefox	B-Application
and	O
Google	B-Application
Chrome	I-Application
.	O
</s>
<s>
Kiosk	B-Application
software	I-Application
is	O
also	O
an	O
option	O
for	O
projects	O
that	O
may	O
not	O
even	O
be	O
using	O
kiosk	O
hardware	O
.	O
</s>
<s>
Windows	B-Application
PCs	I-Application
and	O
Chrome	B-Application
Devices	O
can	O
be	O
configured	O
to	O
run	O
in	O
“	O
kiosk	B-Application
mode	I-Application
”	O
which	O
prevents	O
users	O
from	O
accessing	O
certain	O
system	B-Application
functions	O
.	O
</s>
<s>
For	O
Windows	O
,	O
this	O
may	O
not	O
be	O
appropriate	O
for	O
all	O
uses	O
,	O
since	O
running	O
in	O
kiosk	B-Application
mode	I-Application
may	O
not	O
give	O
deployers	O
the	O
amount	O
of	O
control	O
they	O
need	O
for	O
their	O
final	O
end	O
product	O
configuration	O
.	O
</s>
<s>
Kiosk	B-Application
system	I-Application
software	I-Application
can	O
be	O
used	O
to	O
secure	O
the	O
kiosk	O
or	O
PC	O
instead	O
.	O
</s>
<s>
For	O
those	O
running	O
a	O
Windows	B-Application
OS	I-Application
,	O
an	O
alternative	O
to	O
kiosk	B-Application
software	I-Application
is	O
Group	O
Policy	O
,	O
which	O
serves	O
to	O
restrict	O
user	O
access	O
to	O
certain	O
areas	O
of	O
the	O
operating	O
system	B-Application
,	O
though	O
not	O
without	O
its	O
own	O
drawbacks	O
and	O
security	O
issues	O
.	O
</s>
