In a company is it good to have a back door account

Assignment Help Computer Engineering
Reference no: EM132217594

Having a backdoor account (that is a username/password that can login in to an administrative account on all machines) can be very useful for IT staff.

However, some believe it's a security breach. What are the pros and cons?

Pros

- access even if user forgets password
- access whenever is convenient, for example if user of machine is away on vacation
- another reason I just discovered is because if the user is non-technical they may misunderstand which password you are requesting, for example if they are running virtual machines.

Cons

- may not be feasible when there is confidential information on the machine
- A manager once told us that the company didn't have a backdoor account so that if something went wrong the finger could definitively be pointed at the end user

The last point doesn't really make sense to me. Most people would quickly hand over their login information to an IT staff.

Even if they choose to type in the password themself, it's unlikely they will stand there the whole time and wait until the IT staff logs out. Furthermore if an IT staff is malicious then it's unlikely not having a password of a end users machine will stop him.

In a company is it good to have a back door account?

Reference no: EM132217594

Questions Cloud

Give the associated range of destination host address : Consider a datagram network using 8-bit host addresses, i.e., IP addresses range from 0 to 255.
Write a function max that has two stringparameters : Write an expression that evaluates to true if the value of the string variable s1 is greater than the value of stringvariable s2 .
Write a program that generates a magic square for an array : Use a function to check and see if the random numbers generated have been previously generated in the array,(check for unqiueness)
The method needed to arrange for an object to be notified : The method needed to arrange for an object to be notified when a window's close-window button has been clicked is.
In a company is it good to have a back door account : Having a backdoor account (that is a username/password that can login in to an administrative account on all machines) can be very useful for IT staff.
Accept a variable parameter list of characters and return : Declare an array reference variable, week, and initialize it to an array containing the strings "mon", "tue", "wed", "thu", "fri", "sat", "sun" .
Which of the following is a correct interface : Suppose A is an interface, B is a concrete class with a default constructor that implements A.
Explain the optionsthat are available for a client to use : Explain the optionsthat are available for a client to use DirectAccess if it only has an IPV4 internet connection?
Write a program to display the coordinates to draw : Write a program to display the coordinates to draw positive and negative sloped line using Slope Intercept algorithm.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd