Wednesday, November 2, 2011

Who Threatens a Company's Network Security: System Administrator

Who Threatens a Company's Network Security: System Administrator

Security System

For the corporate network, the greatest danger comes from the inside: IT department employees who built it, changed it and who know more about the network than any other man in the company. When the system administrator starts to "stumble" to steal information, to set full access everywhere to plant or "logic bombs" in databases, is himself employ eliminate the threat. In some cases, IT-ists are pressured to violate company policy by managers more insistent that motivates it would be if an "emergency".

A study on American soil by Verizon and quoted by PC World, 48% of cases of information leakage is due to people within the company. In 90% of the IT-ists a company guilty of such breaches, willful and malicious actions are.

The same study also shows that in 24% of cases of domestic crime, those involved were to leave the company, either because they were fired, either because he submitted his resignation.

To control the "curiosity" employees in the department of IT security experts recommend installing monitoring software privileges granted to the enterprise.
Monitoring the users

It starts even before the employment of network administrators and system. They must check to determine if they have been involved in such crimes.

Once committed, they should not be given more access rights than they need,usually.

Checking employees who leave the company announced that

Many security breaches have occurred as a consequence of the fact that access for employees who would not leave fast enough was restricted.

Monitoring employees for violations known online

In most cases, small crimes will lead to crime in its own right. According to the study published in Verizon, which have harmed employees began with little things, out of curiosity.

Software used for analyzing log files

Security specialists say that in most cases, malicious actions can be detected by studying the log files. Type log files (log) record system activity and related applications.

There are three signs that indicate anomalies in the network: when unexplained amount of information in the log when very long lines appear within the log or login formation when suddenly disappear.

Inform your employees about the threat from within

Security specialists recommend training for IT employees, that they know about security issues internally generated and how they can tell when a fellow offenders.

The best way to combat malicious behavior of a network administrator, experts say, is by educating colleagues of the track.

This are only a few details that the employer need to inform his employees about this risk, for a good security on your company you need to know " "rules" like this for your own protection and also for you company, be very careful with this details because later you will regret that you haven't had the time to informe yourself and also your employees. The problems may come and you will never know how to resolve them if you are an amateur and still doing the same mistakes. For a good information you can also visit the two sites that I give you down. Hope it will be useful for you.

jamaican oxtail recipe pressure cooker wicker basket set plastic kiddie pool

No comments:

Post a Comment