Website under construction



Download 13,37 Mb.
Pdf ko'rish
bet105/131
Sana27.03.2022
Hajmi13,37 Mb.
#512480
1   ...   101   102   103   104   105   106   107   108   ...   131
Bog'liq
9780735697744 Introducing Windows Server 2016 pdf

More info JEA is a detailed subject, and we can provide only the basics here. For further guidance 
and to see all of the configuration options, go to 
http://aka.ms/JEA

A strategy for securing privileged access 
It has to be said that no matter how secure you can make an operating system or service, it is only as 
secure as the weakest password. For example, suppose that you have the most sensitive data on earth 
and you encrypt it by using the most sophisticated technology, but then you use a password like 
“Password01”; this utterly defeats the purpose of putting in place a battery of secure technologies. 
Let’s look at another scenario. Walk around your office and count how many people have written their 
passwords on notes and stuck them on their keyboards or monitors. Then, observe how many people 
have pictures of their family or pets on their desk. When those people need to think of a password, 
what is the likelihood that it might be something personal based on the pictures? 
Now, let’s consider a final scenario: the social engineering attack. With this particular form of attack—
which is a leading cause of security breaks—the attacker calls someone, out of the blue, and pretends 
to be from IT, saying he needs to verify some account information. If the attacker is good at his job
the chances are high that the hapless victim will readily provide the information. 
With those scenarios in mind, the attacker will gain access to something and potentially use that 
access to perform an escalated attack. But, what if the account were a privileged one in the first place. 


119 
CHAPTER 4 | Security and identity 
Securing privileged access is not a single technology; it is a set of practices that an organization can 
implement to become more secure. Although focused primarily on privileged access, it highlights the 
need for any organization to implement and test all policies related to security and conduct the 
necessary readiness to make people aware of potential areas of exposure. 
No network to which users have access will ever be 100 percent secure, but to begin down the path of 
securing privileged access to systems and networks, you must be diligent with regard to the following 
basics: 


Download 13,37 Mb.

Do'stlaringiz bilan baham:
1   ...   101   102   103   104   105   106   107   108   ...   131




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish