IT Security Blog

  • Home
  • About IT Security Blog
  • IT Security Basics
  • Real-World Issues
  • Network Security
  • News
  • Malware
  • Tips
  • Spyware

Defining Security Roles and Administrative Rights Policies

27 July 2007 By Saran

System users are usually granted specific rights with regards to their accessibility options towards the main server. This is why most systems administrators need to identify the licensed users and their rights as defined by their department heads and superiors. Granting rights to all may be a bad decision since it allows the system and the network vulnerable to any form of intrusion at any time without limiting the options of who may be behind it.

security access levels

Such has been an issue that systems administrators must learn to address. It is not mainly about knowing a person but by what he is capable of doing. That is why access rights should be properly labeled as administrators, users or guests. The absence of such tags makes it hard to audit and work backwards in cases where system malfunctions and possible conflicts such as server crashes may ensue. It is best to limit the users at a minimum so that pinpointing the probable suspects can be limited.

[tags]security rights, access levels, accessibility[/tags]

Filed Under: IT Security Basics, Network Security, Operating Systems, Privacy & Anonymity, Programming, Security Policies, Tips, Wireless Security Tagged With: access-levels, accessibility, security-rights

Categories

  • Backups
  • Cryptography
  • E-mail
  • Firefox
  • General
  • Google Chrome
  • IM
  • Instant Messaging
  • IT Security Basics
  • Malware
  • Network Security
  • News
  • Operating Systems
  • Physical Security
  • Privacy & Anonymity
  • Programming
  • Real-World Issues
  • Review
  • Security Policies
  • Spyware
  • Storage
  • Tips
  • Web browsers
  • Wireless Security