In a company is it good to have a back door account

Assignment Help Computer Engineering
Reference no: EM132217594

Having a backdoor account (that is a username/password that can login in to an administrative account on all machines) can be very useful for IT staff.

However, some believe it's a security breach. What are the pros and cons?

Pros

- access even if user forgets password
- access whenever is convenient, for example if user of machine is away on vacation
- another reason I just discovered is because if the user is non-technical they may misunderstand which password you are requesting, for example if they are running virtual machines.

Cons

- may not be feasible when there is confidential information on the machine
- A manager once told us that the company didn't have a backdoor account so that if something went wrong the finger could definitively be pointed at the end user

The last point doesn't really make sense to me. Most people would quickly hand over their login information to an IT staff.

Even if they choose to type in the password themself, it's unlikely they will stand there the whole time and wait until the IT staff logs out. Furthermore if an IT staff is malicious then it's unlikely not having a password of a end users machine will stop him.

In a company is it good to have a back door account?

Reference no: EM132217594

Questions Cloud

Give the associated range of destination host address : Consider a datagram network using 8-bit host addresses, i.e., IP addresses range from 0 to 255.
Write a function max that has two stringparameters : Write an expression that evaluates to true if the value of the string variable s1 is greater than the value of stringvariable s2 .
Write a program that generates a magic square for an array : Use a function to check and see if the random numbers generated have been previously generated in the array,(check for unqiueness)
The method needed to arrange for an object to be notified : The method needed to arrange for an object to be notified when a window's close-window button has been clicked is.
In a company is it good to have a back door account : Having a backdoor account (that is a username/password that can login in to an administrative account on all machines) can be very useful for IT staff.
Accept a variable parameter list of characters and return : Declare an array reference variable, week, and initialize it to an array containing the strings "mon", "tue", "wed", "thu", "fri", "sat", "sun" .
Which of the following is a correct interface : Suppose A is an interface, B is a concrete class with a default constructor that implements A.
Explain the optionsthat are available for a client to use : Explain the optionsthat are available for a client to use DirectAccess if it only has an IPV4 internet connection?
Write a program to display the coordinates to draw : Write a program to display the coordinates to draw positive and negative sloped line using Slope Intercept algorithm.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Design two concrete classes circle and square that inherits

design an abstract class called shape. this class must contain a single constructor that accepts a single numeric value

  Characteristics of rdbms

Explain the characteristics of the Relational Database Management System (RDBMS).

  What should be the initial value of the stack pointer

The inputs to the subroutine are a pointer in register Y and an 8-bit number in register B Starting at the address in register Y.

  Write a program that displays all environment variables

Write a program that displays all environment variables. Write a program that sets an int variable x to 100 before forking a child.

  Draw the lines-shade out a feasable region

Maximize and minimize p = 2x-y with respect to x+y ≥ 2, x+y ≤ 10, x-y ≥ -2 and x-y ≤ 2. (Draw the lines, shade out a feasable region, look at boundary points)

  Determine the computational complexity

Give a concrete example and show the steps you will use to determine the computational complexity (of the real program)

  How are people in this group treated in our society

How are people in this group treated in our society?How have government (local, state and/or federal) attempted to address this problem?

  How to choreograph the given two activities

The sole delicate point lies in how to choreograph the two activities: reading from the standard input and reading from socket connected to the remote shell.

  Create a new user and test out making an sshkey for

Create a .profile file in each of their home folders that adds an environment variable $LAB and has value SUCCESS .

  Write a function called countlines that takes a string

Write a function called countLines() that takes a string representing the name of a file as a parameter, & a string representing a word as the second parameter.

  Find total annual compensation policy to improve sales

The source code should demonstrate the use of conditional and looping structures.find total annual compensation policy to improve sales

  Prompt the student to enter their user name and password

Prompt the student to enter their user name and password. Read a file that contains a list of all students' information to validate the login credentials.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd