Servers Are the Primary Target for Insiders and Hackers Alike
John Mutch and
Brian Anderson
Chapter Chapter 5 in Preventing Good People from doing Bad Things, 2011, pp 79-96 from Springer
Abstract:
Abstract There is a significant distinction between the data on desktops described in the last chapter and the data on the server. To use another metaphor: if misusing desktop privilege can get you into the bank, then misusing server privilege is the equivalent of carte-blanche access to the bank vault. Indeed, in a secure and compliant server environment, end users are not entitled to the root password or even superuser status because organizations can no longer tolerate the security risks posed by intentional, accidental, or indirect misuse of privileges. However, organizations need to provide the admins of the plethora of heterogeneous servers across the enterprise with necessary privileges within specified guidelines to do their job safely.
Keywords: Open Source Software; Health Information Exchange; Privilege Access; Good People; Data Analysis Strategy (search for similar items in EconPapers)
Date: 2011
References: Add references at CitEc
Citations:
There are no downloads for this item, see the EconPapers FAQ for hints about obtaining it.
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:spr:sprchp:978-1-4302-3922-2_5
Ordering information: This item can be ordered from
http://www.springer.com/9781430239222
DOI: 10.1007/978-1-4302-3922-2_5
Access Statistics for this chapter
More chapters in Springer Books from Springer
Bibliographic data for series maintained by Sonal Shukla () and Springer Nature Abstracting and Indexing ().