You Can Order For A Similar Custom Written Paper 24/7!

For all college assessment assignments, fill the order form with the requested details and get your essays done promptly.

Posted: August 29th, 2022

Dealing with Bad Practices

Dealing with Bad Practices

Shared accounts
Shared accounts refer to any resource that utilizes a sole pair of credentials to authenticate many users. Shared accounts are not considered good practice; as such, they are bad practice. This is because they make it hard to identify the actual user and they make it possible for individuals with malicious intent to utilize them with anonymity (Anderson & Mutch, 2011). Also, accounts utilized by a shared group of users usually have poor passwords that malicious individuals can easily guess. More so, users do not adjust these accounts’ passwords regularly or when a group member leaves. This puts multiple systems at risk of being compromised in the event the members who left the group share the passwords with outsiders.
Unique user accounts, no password required
This is a bad practice because it poses many dangers to multiple IT systems. For one, the lack of a password may put the confidentiality, integrity and availability of a company’s data and resources at risk of being compromised. For instance, unauthorized persons can easily get access to these accounts, get hold of confidential information and steal it (Afonin & Katalov, 2016: 2024 – Do my homework – Help write my assignment online). In some instances, these persons may alter the original data thus compromising its integrity. The lack of a password also puts a company at risk of being a victim of fraud. People with malicious intents can easily access these accounts and use them to defraud people, move money etc. and then leave.
Unique user accounts, password never needs to be changed
Unique user accounts where password never needs to be changed are a bad practice. This is so because to begin with, this practice increases the risk of constant access by hackers. Once a hacker knows the password of the account, he/she may attempt to access these accounts more than once over a period of time and do what they will with the account. This practice also serves to increase access gained by keystroke loggers. A keystroke logger refers to a technology that focuses on surveillance, and it is utilized in recording keystrokes (Kim & Solomon, 2016: 2024 – Do my homework – Help write my assignment online). Never changing the password increases the keylogger’s success in identifying the password and other login details being used in the unique user accounts. As such, the hacker can leverage this to steal important information from the computer systems. Moreover, never changing the password makes it more likely that passwords obtained through this approach will be useful to attackers for a long period of time.
Administrators have used their privileged accounts to perform basic user activities
The practice of administrators using their privileged accounts to carry out basic user activities is very dangerous. This practice makes it easier for hackers to introduce malware to the accounts through a phishing attack or obtain the credentials of the administrator by utilizing impersonation; this is particularly a frequent attack in the Microsoft Windows environment. In this regard, the subsequent phishing attack can lead to theft of company information, and a result, the company can experience significant financial losses, and damage to its reputation. Gaining the administrator’s credentials can also make it possible for attackers to infiltrate the company’s systems and instigate more attacks so as to steal more information. This practice increases the risk of accidental errors as well. Privileged access allows the administrator to bypass access controls, and for this reason, errors made by the administrator may have catastrophic results, leading to loss of data or substantial downtime. For instance, on a Unix system, an additional space may change “rm –Rf /tmp/olddata” into “rm –Rf / tmp/olddata”, deleting the whole file system. This is a kind of error that leads to data loss.

References
Afonin, O., & Katalov, V. (2016: 2024 – Do my homework – Help write my assignment online). Mobile forensics – Advanced investigative strategies. Packt Publishing.
Anderson, B., & Mutch, J. (2011). Preventing good people from doing bad things: Implementing least privilege. Apress.
Kim, D. & Solomon, M. G. (2016: 2024 – Do my homework – Help write my assignment online). Fundamentals of information systems security. Jones & Bartlett Publishers.

Order | Check Discount

Academic Paper Writing Help For You!

Get 20-25% Off On Your Order!

Why choose us

You Want Quality and That’s What We Deliver

Professional Writers

We assemble our team by selectively choosing highly skilled writers, each boasting specialized knowledge in specific subject areas and a robust background in academic writing

Discounted Prices

Our service is committed to delivering the finest writers at the most competitive rates, ensuring that affordability is balanced with uncompromising quality. Our pricing strategy is designed to be both fair and reasonable, standing out favorably against other writing services in the market.

AI & Plagiarism-Free

Rest assured, you'll never receive a product tainted by plagiarism or AI-generated content. Each paper is research-written by human writers, followed by a rigorous scanning process of the final draft before it's delivered to you, ensuring the content is entirely original and maintaining our unwavering commitment to providing plagiarism-free work.

How it works

When you decide to place an order with Nurscola, here is what happens: