Order for this Custom Paper or similar Assignment Help Services

Fill the order form details in 3 easy steps - Instructions Guide .

Posted: November 9th, 2022

Dealing with Bad Practices

Dealing with Bad Practices

Shared accounts
Shared accounts refer to any resource that utilizes a sole pair of credentials to authenticate many users. Shared accounts are not considered good practice; as such, they are bad practice. This is because they make it hard to identify the actual user and they make it possible for individuals with malicious intent to utilize them with anonymity (Anderson & Mutch, 2011). Also, accounts utilized by a shared group of users usually have poor passwords that malicious individuals can easily guess. More so, users do not adjust these accounts’ passwords regularly or when a group member leaves. This puts multiple systems at risk of being compromised in the event the members who left the group share the passwords with outsiders.
Unique user accounts, no password required
This is a bad practice because it poses many dangers to multiple IT systems. For one, the lack of a password may put the confidentiality, integrity and availability of a company’s data and resources at risk of being compromised. For instance, unauthorized persons can easily get access to these accounts, get hold of confidential information and steal it (Afonin & Katalov, 2016). In some instances, these persons may alter the original data thus compromising its integrity. The lack of a password also puts a company at risk of being a victim of fraud. People with malicious intents can easily access these accounts and use them to defraud people, move money etc. and then leave.
Unique user accounts, password never needs to be changed
Unique user accounts where password never needs to be changed are a bad practice. This is so because to begin with, this practice increases the risk of constant access by hackers. Once a hacker knows the password of the account, he/she may attempt to access these accounts more than once over a period of time and do what they will with the account. This practice also serves to increase access gained by keystroke loggers. A keystroke logger refers to a technology that focuses on surveillance, and it is utilized in recording keystrokes (Kim & Solomon, 2016). Never changing the password increases the keylogger’s success in identifying the password and other login details being used in the unique user accounts. As such, the hacker can leverage this to steal important information from the computer systems. Moreover, never changing the password makes it more likely that passwords obtained through this approach will be useful to attackers for a long period of time.
Administrators have used their privileged accounts to perform basic user activities
The practice of administrators using their privileged accounts to carry out basic user activities is very dangerous. This practice makes it easier for hackers to introduce malware to the accounts through a phishing attack or obtain the credentials of the administrator by utilizing impersonation; this is particularly a frequent attack in the Microsoft Windows environment. In this regard, the subsequent phishing attack can lead to theft of company information, and a result, the company can experience significant financial losses, and damage to its reputation. Gaining the administrator’s credentials can also make it possible for attackers to infiltrate the company’s systems and instigate more attacks so as to steal more information. This practice increases the risk of accidental errors as well. Privileged access allows the administrator to bypass access controls, and for this reason, errors made by the administrator may have catastrophic results, leading to loss of data or substantial downtime. For instance, on a Unix system, an additional space may change “rm –Rf /tmp/olddata” into “rm –Rf / tmp/olddata”, deleting the whole file system. This is a kind of error that leads to data loss.

References
Afonin, O., & Katalov, V. (2016). Mobile forensics – Advanced investigative strategies. Packt Publishing.
Anderson, B., & Mutch, J. (2011). Preventing good people from doing bad things: Implementing least privilege. Apress.
Kim, D. & Solomon, M. G. (2016). Fundamentals of information systems security. Jones & Bartlett Publishers.

Order | Check Discount

Tags: assignment writing homework help, best essay writing website, best online essay writing services, capstone project writer, college application essay writing service

Assignment Help For You!

Special Offer! Get 15-30% Off on Each Order!

Why Seek Our Custom Writing Services

Every Student Wants Quality and That’s What We Deliver

Graduate Essay Writers

Only the most qualified writers are selected to be a part of our research and editorial team, with each possessing specialized knowledge in specific subjects and a background in academic writing.

Affordable Prices

Our prices strike the perfect balance between affordability and quality. We offer student-friendly rates that are competitive within the industry, without compromising on our high writing service standards.

100% Plagiarism-Free

No AI/chatgpt use. We write all our papers from scratch thus 0% similarity index. We scan every final draft before submitting it to a customer.

How it works

When you opt to place an order with Nursing Study Bay, here is what happens:

Fill the Order Form

You will complete our order form, filling in all of the fields and giving us as much instructions detail as possible.

Assignment of Writer

We assess your order and pair it with a custom writer who possesses the specific qualifications for that subject. They then start the research/write from scratch.

Order in Progress and Delivery

You and the assigned writer have direct communication throughout the process. Upon receiving the final draft, you can either approve it or request revisions.

Giving us Feedback (and other options)

We seek to understand your experience. You can also peruse testimonials from other clients. From several options, you can select your preferred writer.

Expert paper writers are just a few clicks away

Place an order in 3 easy steps. Takes less than 5 mins.

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:
$0.00