首页> 外文期刊>Information Week >Take It From The Top
【24h】

Take It From The Top

机译:从顶部开始

获取原文
获取原文并翻译 | 示例
           

摘要

Chances are good that many of your servers share administrator passwords that haven't been changed in a long time. Chances also are good that these passwords are well-known to many staff members-including some former ones. If that doesn't scare you, it should: Anyone who knows the passwords could log in and have complete control over servers and applications, and you'd have no ability to track who made changes or accessed data. The problems with poor administrative password management extend beyond insiders to external threats as well. Penetration testers have proven that there's a way into nearly every network, and once attackers find it-often in a typical user's desktop-they can reverse-engineer the passwords on the system and discover the local administrator password. If this password is common to other systems, as it often is, attackers can then use it to access other systems and move through the network.
机译:很多服务器共享很长一段时间未更改的管理员密码的可能性很大。这些密码对于许多工作人员(包括一些以前的工作人员)是众所周知的,也很可能。如果这不吓您,那么它应该:知道密码的任何人都可以登录并完全控制服务器和应用程序,并且您将无法跟踪谁进行了更改或访问了数据。管理密码管理不善的问题还不仅限于内部人员,还包括外部威胁。渗透测试人员已经证明,几乎每个网络都有一种方法,一旦攻击者通常在典型用户的桌面上找到它,他们便可以对系统上的密码进行反向工程并发现本地管理员密码。如果此密码是其他系统常用的密码,则攻击者可以使用它访问其他系统并在网络中移动。

著录项

  • 来源
    《Information Week》 |2009年第1225期|p.43-4447-48|共4页
  • 作者

  • 作者单位
  • 收录信息
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号