whitepaper 1 - Creating a Secure Computer User