You are here: hacking technology > crack analyzes > Content
Hot Articles
Recommend Articles
New Articles
k privileged accounts staff?can be a security risk
  Add date: 09/28/2010   Publishing date: 09/28/2010   Hits: 16
Total 3 pages, Current page:1, Jump to page:
 
I never used to have to find the phone - it was always in the room. But now we have this wonderful system in the home DECT phones in the main towns, as my daughter's bedroom, usually under a mountain?to Everest?similar clothing. No matter how often we agree that the last person who used the phone back to its rechtm??quality space must be made, it still seems that every time it rings the hunt is on. I pers?Personal think the policy of returning the phone to her rechtm??term course is a good policy, my problem is the application and I have no time, personalizedPersonal monitoring 24x7. One of the gr??th issues facing organizations is to eliminate bad practices associated with the use and misuse of privileged accounts. Organizations are often ignored before realistic policy, this is mostly due to lack of resources or without politics, that there is no control. Therefore, it is worth considering some of the h?common problems and proposes?gt ways this can be improved.
Accounts have Super User or Administrator rights - does not generally permit a company that user account to have privileged access. Create In many organizations the IT staff to user accounts with administrator privileges. This is h?frequently the case with UNIX systems in the root account is normally not remotely access the system. The problem with this approach is that real users often tend to use their specific user account for general access. This will lead to serious problems if tests are conducted for the security of IT to the problem of trying to figure out what user names were simply for general access, and they were for specific administrative tasks. In some environments, such practices may also expose the system Trojan attacks, especially in the Windows environment -. Recommendation, as it always necessary, joint accounts have services such as UNIX, Windows, and access in some environments, if the password?on joint accounts should be kept in a safe place, and the number of user accounts with privileged access should be kept to a minimum and a password?as for these accounts must be regular??ig be changed. In addition, access to the password?a joint account and the administrative / root / password?available as services must be based on a "Necessity "Fundamentals should be in politics. By default??strength is when a user accesses one of these passwords?words?must register as a test.
Each joint account has an account holder (s) responsible for controlling access to the account have. This should Notfallma?envisaged if a member of the group leaders to be approved k?, Can be the password to ver?Any publicto -. Systems all share the same password?privileged, as usual, which means that all systems are grouped by categories, and all systems share the same password?as privileged. This is a g?standard practice in Windows environments where frequently all service accounts the same password?a, with the obvious conclusion that the Pa?word get?to a service account, all accounts are on the Internet -. Recommended to all privileged accounts should own password?others and must be configured, then at least every 30 days

 
Other pages: : 1 * 2 * 3 * Next>>
Prev:Mother pleads guilty to pornographic spam Next:Secure access and authentication of users with cyber-terrorism deal

Comment:

Category: Home > crack analyzes