![]() ![]() ![]() Necessary to identify legitimate users and system components. IDENTITY MANAGEMENT: Identity management refers to controls and procedures ![]() These topics arc discussed in the following User security requires identity management, comprehensive p:issword protection,ĭefenses :igainst social engineering, an effective means of overcoming user resistance, UnaurhorilCd ancmpt to increase peirmjssion levels. ![]() The compromised account a11d may attempt a privilege e\calation attack, which is an Typically, an intruder accesses the S)Stem using Unfortunately, many system break-ins begin with a user account Ullimarely depends on S)'Stem users and their habits, practices, and willingness to sup. Regardless of o ther security precautions and fearures, security User ecunry involves t he identification of system users and consideranon of user-re. If a person is transferred, he or she leaves certain groups and joins _.~.""_.Ĭhapter 12 Managing Systems Support and Security 12.6 Security Levels User's rights to be determined by his or her work responsibilities, rather than by M any firms use chis approach because it allows a A better approach, from a system adminisrracor's viewpoint, might be toĬreate a user group, add pecific users, and assign file permissions to the group, Reque~c a higher level of permissions char would enable any of chem co change fileĬontent. USER GROUPS: Individual users who need to collaborate and share files often nn any case, a well-documented andĮnforced permissions policy is necessary co promote file security and reduce system Levels in ocher companies, a n appropriate level of management approval is requi redįor a ny pe rmissio ns above a standard user level. In some firms, the system administrator has broad discretion in assigning these User has onl y the minimum permissions necessary ro perform his or her work-nor When assigning file permissions, a system administrator s11ould ensure that each Write a direcrory: The user can add and ren1ove files in the directory.Read a directory: The user can list the contents of the directory.Execute a file: The u~er can run the file, if it is a program.Write a file: The user can change the contents of the file.Read a file: The user can read the contents of the file.The mosrĬommon permissions are read, write, and execute. PERMISSIONS: File security is based on establishing a set of permissions, whichĭescribe the rights a user has to a particular file or directory on a ser ver. Tures built-in to most modern operating systems. Macerial such as personnel or financial records. AllĬorporate data must be protected, bur encryption is especiaUy important for sen!>iti ve Permissions, which can be assigned co individual users or to user gro ups.ĮNCRYPTION: As explained in che section on necwork secu rity, encryption scram-īles the contents of :i file or document to protect ic from unauthorized :iccess. Of encryption o r encodi ng fi les ro make t hem unreadable by una uthorized users, and The safccy and prorccrion of these files is a viral clement in anyĬomputer security progrnm, a nd a systems a nal yse needs to consider the impo rta nce AsĮxplained in the nerwork security section, an NIDS can alert a system administ ratorĬomputer configuration settings, users' personal information, and other sensiti ve dataĪrc stored in files. to determine if misuse or wrongdoing has occurred.Other informauon that could help track down unauthorized use. ForĮxample, a partern of login errors mighc reveal the details of an intrusion arrempt.Ī log also can include S) stem error messages, login histories, file manipulauon, and LogsĬan be important in understanding past attacks and preventing future intrusions. T hat documents all event., includmg daces, cimes, and other specific information. SOFTWARE LOGS: Operating systems and applications typically maintain a log 12.6 Security Levels Phase 5 Systems Support and SecurityĪnd should be used only if changes can readily be undone if unexpected results or ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |