Sunteți pe pagina 1din 2

Facultad de Ingeniería de Sistemas de Información Carlos Guillermo Palacios Obregón

Maestría de Seguridad de Sistemas de Información 1293-12-4170

Unfortunately on the institutions exists The reasons why the principle of least
several problematic that are related possible privilege works is why is
with the identity and the stole of should decide the privilege of access
information. really need a person for make work, of
such way that any failure, vulnerability
How for example in the institutions or accident have an impact minimum.
they have employees who have been
working for years and have gone We must think always in the security,
through several departments and jobs because most people we resist to want
without having their access to each use accounts or equipment what not
one of them revoked, becoming an arrange of the privilege of
easy goal of credential theft, there administrator and have access all the
have even been employees who leave system configuration.
institution and still they have access to
the platform.
This implies that we as users can be
installing or uninstall programs, have
A study published by Prensa Libre the
access without restriction any all the
day 7 of September of year 2017
websites and make changes of
reveals what 80% of the cases of
configuration operating systems.
cybercrime they come of the own
personal of the company and of is
At the time of not limiting the users with
percentage the 36% have with stole of
the minimum privilege would have we
information, which on is subtracted
infections of malware, data filtering,
through memories USB.
corruption of archives, identity fraud,
this could compromise the information
90% percent of the attacks that are
of company.
made to companies the objective of it
is the capture of credential, in this way
We must have an administrator user,
the cybercriminal can get access and
this user has access complete the
perform to different actions.
equipment and can do the change
Facultad de Ingeniería de Sistemas de Información Carlos Guillermo Palacios Obregón
Maestría de Seguridad de Sistemas de Información 1293-12-4170

what whish, how by example: we can in the good development of user


perform homeworkers for the activities, to combat this problem at the
management of operating system, root and establish a strategy what
software installation and net increase the levels of security, defining
configuration, on the other part we roles for each user.
should also have a user with standard
privilege for perform we our everyday For this reason our work must be
chores, how to manage our mail, carried out under the principle of the
navigate on allowed sites, etc., with its lowest possible privilege.
we would minimize the risk of filtration
of data, espionage, corruption of
records, malware and of else.

Most of malware what exist in the


actuality use the account of users
authenticated in the equipment for
perform any action that is allowed.

Grant the permissions adequate to


each user of a system, it's very
important for the availability how is for
confidentiality and integrity.

That’s why the policies not alone must


of take care of the assignment also of
the revocation of the same how for
example when on vacation, leave the
company or change departments.

Is very important for the company have


security politics that come to contribute

S-ar putea să vă placă și