Order For Similar Custom Papers & Assignment Help Services

Fill the order form details - writing instructions guides, and get your paper done.

Posted: August 29th, 2022

Dealing with Bad Practices

Dealing with Bad Practices

Shared accounts
Shared accounts refer to any resource that utilizes a sole pair of credentials to authenticate many users. Shared accounts are not considered good practice; as such, they are bad practice. This is because they make it hard to identify the actual user and they make it possible for individuals with malicious intent to utilize them with anonymity (Anderson & Mutch, 2011). Also, accounts utilized by a shared group of users usually have poor passwords that malicious individuals can easily guess. More so, users do not adjust these accounts’ passwords regularly or when a group member leaves. This puts multiple systems at risk of being compromised in the event the members who left the group share the passwords with outsiders.
Unique user accounts, no password required
This is a bad practice because it poses many dangers to multiple IT systems. For one, the lack of a password may put the confidentiality, integrity and availability of a company’s data and resources at risk of being compromised. For instance, unauthorized persons can easily get access to these accounts, get hold of confidential information and steal it (Afonin & Katalov, 2016). In some instances, these persons may alter the original data thus compromising its integrity. The lack of a password also puts a company at risk of being a victim of fraud. People with malicious intents can easily access these accounts and use them to defraud people, move money etc. and then leave.
Unique user accounts, password never needs to be changed
Unique user accounts where password never needs to be changed are a bad practice. This is so because to begin with, this practice increases the risk of constant access by hackers. Once a hacker knows the password of the account, he/she may attempt to access these accounts more than once over a period of time and do what they will with the account. This practice also serves to increase access gained by keystroke loggers. A keystroke logger refers to a technology that focuses on surveillance, and it is utilized in recording keystrokes (Kim & Solomon, 2016). Never changing the password increases the keylogger’s success in identifying the password and other login details being used in the unique user accounts. As such, the hacker can leverage this to steal important information from the computer systems. Moreover, never changing the password makes it more likely that passwords obtained through this approach will be useful to attackers for a long period of time.
Administrators have used their privileged accounts to perform basic user activities
The practice of administrators using their privileged accounts to carry out basic user activities is very dangerous. This practice makes it easier for hackers to introduce malware to the accounts through a phishing attack or obtain the credentials of the administrator by utilizing impersonation; this is particularly a frequent attack in the Microsoft Windows environment. In this regard, the subsequent phishing attack can lead to theft of company information, and a result, the company can experience significant financial losses, and damage to its reputation. Gaining the administrator’s credentials can also make it possible for attackers to infiltrate the company’s systems and instigate more attacks so as to steal more information. This practice increases the risk of accidental errors as well. Privileged access allows the administrator to bypass access controls, and for this reason, errors made by the administrator may have catastrophic results, leading to loss of data or substantial downtime. For instance, on a Unix system, an additional space may change “rm –Rf /tmp/olddata” into “rm –Rf / tmp/olddata”, deleting the whole file system. This is a kind of error that leads to data loss.

References
Afonin, O., & Katalov, V. (2016). Mobile forensics – Advanced investigative strategies. Packt Publishing.
Anderson, B., & Mutch, J. (2011). Preventing good people from doing bad things: Implementing least privilege. Apress.
Kim, D. & Solomon, M. G. (2016). Fundamentals of information systems security. Jones & Bartlett Publishers.

Order | Check Discount

Tags: Dealing with Bad Practices

Assignment Help For You!

Special Offer! Get 20-25% Off On your Order!

Why choose us

You Want Quality and That’s What We Deliver

Top Skilled Writers

To ensure professionalism, we carefully curate our team by handpicking highly skilled writers and editors, each possessing specialized knowledge in distinct subject areas and a strong background in academic writing. This selection process guarantees that our writers are well-equipped to write on a variety of topics with expertise. Whether it's help writing an essay in nursing, medical, healthcare, management, psychology, and other related subjects, we have the right expert for you. Our diverse team 24/7 ensures that we can meet the specific needs of students across the various learning instututions.

Affordable Prices

The Essay Bishops 'write my paper' online service strives to provide the best writers at the most competitive rates—student-friendly cost, ensuring affordability without compromising on quality. We understand the financial constraints students face and aim to offer exceptional value. Our pricing is both fair and reasonable to college/university students in comparison to other paper writing services in the academic market. This commitment to affordability sets us apart and makes our services accessible to a wider range of students.

100% Plagiarism-Free

Minimal Similarity Index Score on our content. Rest assured, you'll never receive a product with any traces of plagiarism, AI, GenAI, or ChatGPT, as our team is dedicated to ensuring the highest standards of originality. We rigorously scan each final draft before it's sent to you, guaranteeing originality and maintaining our commitment to delivering plagiarism-free content. Your satisfaction and trust are our top priorities.

How it works

When you decide to place an order with Dissertation App, here is what happens:

Complete the Order Form

You will complete our order form, filling in all of the fields and giving us as much detail as possible.

Assignment of Writer

We analyze your order and match it with a writer who has the unique qualifications to complete it, and he begins from scratch.

Order in Production and Delivered

You and your writer communicate directly during the process, and, once you receive the final draft, you either approve it or ask for revisions.

Giving us Feedback (and other options)

We want to know how your experience went. You can read other clients’ testimonials too. And among many options, you can choose a favorite writer.