Advertisement

Servers Are the Primary Target for Insiders and Hackers Alike

  • John Mutch
  • Brian Anderson

Abstract

There is a significant distinction between the data on desktops described in the last chapter and the data on the server. To use another metaphor: if misusing desktop privilege can get you into the bank, then misusing server privilege is the equivalent of carte-blanche access to the bank vault. Indeed, in a secure and compliant server environment, end users are not entitled to the root password or even superuser status because organizations can no longer tolerate the security risks posed by intentional, accidental, or indirect misuse of privileges. However, organizations need to provide the admins of the plethora of heterogeneous servers across the enterprise with necessary privileges within specified guidelines to do their job safely.

Keywords

Open Source Software Health Information Exchange Privilege Access Good People Data Analysis Strategy 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© John Mutch, Brian Anderson 2011

Authors and Affiliations

  • John Mutch
  • Brian Anderson

There are no affiliations available

Personalised recommendations