Question

In: Computer Science

Discuss why protecting privileged administration and default accounts is a critical security control. 2. Research and...

Discuss why protecting privileged administration and default accounts is a critical security control. 2. Research and identify websites that list the default passwords for common privileged accounts (e.g., Cisco router enable password, Microsoft SQL Server SA, Red Hat Linux root, etc.)

Solutions

Expert Solution

Before discussing why privileged accounts are protected we first think about what is privilege accounts. By definition, Privileged accounts are the most powerful users in any organization. These accounts include shared accounts and superuser accounts. the security of [rivilaged accounts are focused because mismanaged privileges pose devastating risks to organizations, including financial losses, reputational damage, regulatory penalties and customer loss. To reduce the risk around shared and privileged accounts, first and foremost there’s a need for accountability.
The main type of privileged accounts usually found in an enterprise or a company are listed below
Local Administrative Accounts
Privileged User Accounts
Active Directory or Domain Service Accounts
Application Accounts
Domain Administrative Accounts
Emergency Accounts
Service Accounts


after that, the question arises why protecting privileged administration and default accounts is a critical security control?


  
Your privileged accounts, such as your Windows Administrator accounts, are required for your platforms to function properly. Therefore, gaining control of these accounts is at the top of the hacker's list, and equally important, the top of your auditor's findings list, and is an essential component of compliance mandates associated with Sarbanes-Oxley, the Payment Card Industry Data Security Standard (PCI DSS), NERC, and HIPAA. Also, many of your business partners are likely to ask for a review of controls associated with your privileged accounts as part of their Statement on Auditing Standards (SAS) 70 reviews.
access to most of these accounts gives the administrator what I refer to as “SuperUser” status. For Windows, the Super Administrator account is different from your current Administrator account, as it gives your administrator much more power to change things in the Operating system. Windows don’t call this a special account, but it sure gives you some extra privileges over the normal administrator account. Some of the privileges include but aren’t limited to full administrator rights and override UAC (User Access Control), to do some over-the-top troubleshooting.

The main key of security is called as privileged access control and id discussed as Privileged accounts are often targeted by an adversary due to their access across the breadth of an organisation’s
network and systems. Restricting the use of built-in administrator groups and accounts and delegating privileged
permissions by the principles of least privilege is an effective way to reduce the impact and spread of
an adversary’s access during a cyber intrusion.
Techniques for the security of privileged accounts are

1. Ensure that unique identifiable accounts are linked to individual users and they are authenticated every time
privileged access is granted on a system. This will ensure accountability and attribution of all actions.
2. Restrict access for privileged accounts by issuing administrators a standard user account in addition to separate
privileged and unprivileged administrator accounts for administrative purposes. Separate user and administrator

The common privileged accounts hacks are

Shared accounts – Looking to cut corners and make things simpler, IT admins often re-use the same password across multiple systems and among multiple administrators.
Social exploits – A seemingly innocuous email might be the finely crafted work of a dangerous hacker.
Brute force – This old school model of hacking involves tools commonly available on the Internet (like “rainbow tables”) that let hackers break weak passwords and gain access to the network.
Default passwords – Many hardware devices and applications come pre-configured with default passwords that are publicly known. If these default passwords aren’t changed, they’re an easy access point for a hacker.


Related Solutions

Discuss the role of the Federal Trade Commission (FTC) in regards to protecting privacy and security....
Discuss the role of the Federal Trade Commission (FTC) in regards to protecting privacy and security. (Please type response)
a.       Explain why the nervous system is described as “immunologically privileged,” and discuss whether this provides a...
a.       Explain why the nervous system is described as “immunologically privileged,” and discuss whether this provides a beneficial or disadvantageous effect in this system. b.      Discuss the defenses a pathogen encounters as it attempts to gain entry into the nervous system.
Why is applied research is the most valuable to healthcare administration?
Why is applied research is the most valuable to healthcare administration?
1. Discuss administration of enteric-coated tablets. 2. Discuss preparation and administration of medication in an ampule....
1. Discuss administration of enteric-coated tablets. 2. Discuss preparation and administration of medication in an ampule. 3. Explain the nursing responsibilities after a medication error. 4. Discuss administration of nitroglycerin patch. 5. Explain the implications of taking herbal supplements. 6. Discuss the steps in the administration of otic drops in both adult and pediatric patients. 7. Discuss the steps in using a metered-dose inhaler. 8. Explain vitamin K deficiency. List the drugs contraindicated to patients with vitamin K   deficiency. 9....
2) According to the Social Security Administration, in 2018 the average wages and earnings in the...
2) According to the Social Security Administration, in 2018 the average wages and earnings in the US was $50,000, the median was $32,838 and σ=$10,200 based on 167 million wage earners. a) From the above data, are earnings normally distributed? Explain your reasoning. b) Regardless of you answer above, assume wages and earnings are normally distributed. Construct a 95% confidence interval for the mean using the above data. c) Regardless of you answer above, assume wages and earnings are normally...
For Network Access Control and Cloud Security You are required to research and report on this...
For Network Access Control and Cloud Security You are required to research and report on this topic according to the Detail of Question below. A. Select one paper to: Read, understand in order to present three main parts: 1. Summary: o Provide a 200-300 word summary of the paper under review, from the background to the results being presented, and further work proposed. Please do NOT copy the abstract into this space! 2. Main points: o The main issues as...
why we Needs the Security Administration Tools, and what is benefits from these tools?
why we Needs the Security Administration Tools, and what is benefits from these tools?
Describe each of the 5 main types of cyber security: 1) Critical infrastructure security: 2) Application...
Describe each of the 5 main types of cyber security: 1) Critical infrastructure security: 2) Application security: 3) Network Security: 4) Cloud security: 5) Internet of things security
Why is the Control Environment such a critical element of COSO? Identify three elements that create...
Why is the Control Environment such a critical element of COSO? Identify three elements that create a strong control environment.
1.Research, then list the Ten Rights of Medication Administration. 2. Think of a "trick" that will...
1.Research, then list the Ten Rights of Medication Administration. 2. Think of a "trick" that will help you to remember the ten rights. Explain what you came up with and why you believe that it will work for you (and possibly others!) I'm doing homework for Math and need to know how to remember the medication right
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT