EconPapers    
Economics at your fingertips  
 

Servers Are the Primary Target for Insiders and Hackers Alike

John Mutch and Brian Anderson

Chapter Chapter 5 in Preventing Good People from doing Bad Things, 2011, pp 79-96 from Springer

Abstract: Abstract There is a significant distinction between the data on desktops described in the last chapter and the data on the server. To use another metaphor: if misusing desktop privilege can get you into the bank, then misusing server privilege is the equivalent of carte-blanche access to the bank vault. Indeed, in a secure and compliant server environment, end users are not entitled to the root password or even superuser status because organizations can no longer tolerate the security risks posed by intentional, accidental, or indirect misuse of privileges. However, organizations need to provide the admins of the plethora of heterogeneous servers across the enterprise with necessary privileges within specified guidelines to do their job safely.

Keywords: Open Source Software; Health Information Exchange; Privilege Access; Good People; Data Analysis Strategy (search for similar items in EconPapers)
Date: 2011
References: Add references at CitEc
Citations:

There are no downloads for this item, see the EconPapers FAQ for hints about obtaining it.

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:spr:sprchp:978-1-4302-3922-2_5

Ordering information: This item can be ordered from
http://www.springer.com/9781430239222

DOI: 10.1007/978-1-4302-3922-2_5

Access Statistics for this chapter

More chapters in Springer Books from Springer
Bibliographic data for series maintained by Sonal Shukla () and Springer Nature Abstracting and Indexing ().

 
Page updated 2025-06-16
Handle: RePEc:spr:sprchp:978-1-4302-3922-2_5