Security procedures should be completed according to the specific operating system and computer manufacturer specifications and include