13 Dec 2022

85

The Concept of Least Privilege in Enhancing Security

Format: APA

Academic level: College

Paper type: Assignment

Words: 306

Pages: 1

Downloads: 0

The concept of least privilege is based on the idea that a user, a program, or a process should have the minimum privileges that are required to perform necessary functions. It implies that user accounts should run with as few privileges as possible and that applications should also launch with minimal privileges. For instance, a program or a user whose sole function is to retrieve records from the database do not need to have administrative rights. Following the concept of least privilege is critical in enhancing protection of data, improving fault tolerance, and protecting a system from malicious behavior. Systematic violation of the principle of least privilege has thus been found to be one of the main causes of security vulnerabilities (Hammad et al., 2017). The concept of least privilege is also critical in administration as it can prevent substantial vulnerabilities in cloud computing (Puyang et al., 2017). Following the concept of least privilege is thus foundational to improving the security of a system. 

The concept of least privilege can be achieved in a system through access control. Access control involves maintaining the lowest level of required access for a system. One of the main approaches that can be used is ensuring that accounts do not have administrative control of a system. Access control works by first identifying the functions of different users and programs within a system. Users are then assigned privileges based on their functions and can only perform operations based on their levels of privilege (Huh et al., 2016). Another approach to realize the least privilege principle is through privilege bracketing. Privilege bracketing involves software privilege being temporarily increased so as to perform a specific function and dismissing them once it is not necessary. Such an approach can be used to limit the inherent risks when providing privileges. 

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

References 

Hammad, M., Bagheri, H., & Malek, S. (2017, April). Determination and enforcement of least-privilege architecture in android. In  2017 IEEE international conference on software architecture (ICSA)  (pp. 59-68). IEEE. 

Huh, J. H., Bobba, R. B., Markham, T., Nicol, D. M., Hull, J., Chernoguzov, A., ... & Huang, J. (2016). Next-generation access control for distributed control systems.  IEEE Internet Computing 20 (5), 28-37. 

Puyang, T., Shen, Q., Luo, Y., Luo, W., & Wu, Z. (2017, May). Making least privilege the low-hanging fruit in clouds. In  2017 IEEE International Conference on Communications (ICC)  (pp. 1-7). IEEE. 

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 17). The Concept of Least Privilege in Enhancing Security.
https://studybounty.com/the-concept-of-least-privilege-in-enhancing-security-assignment

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

Security Implication of the Internet of Things

The Internet of Things (IoT) can be described as s system of interconnected devices that have the ability to transfer information over a computer network without the need of human-to-computer or human-to-human...

Words: 892

Pages: 3

Views: 96

Modern Day Attacks Against Firewalls and VPNs

Introduction The need to have an enhanced security of the computer connectivity happens to be one of the reasons that attract companies and organizations towards wide usage of VPNs. Several simple techniques...

Words: 2025

Pages: 7

Views: 134

How to Deploy and Administer Windows Server 2012

Securing a reliable, and expandable configuration for a company is important to build a strong network. The new and enhanced features of the Windows Server 2012 can be used to implement the network. In this...

Words: 1673

Pages: 6

Views: 87

Deployment Model in Cloud Computing

Deployment model is a representation of a cloud environment primarily distinguished by parameters such as accessibility, proprietorship, and storage size. The National Institute of Standards and Technology gives the...

Words: 254

Pages: 1

Views: 82

How to Use Web Search Engines for Business Research

The advancement of technology has made it possible for many people around the world to have easy access to information whenever they want. The development of the Wide World Web-enabled different kinds of information...

Words: 773

Pages: 3

Views: 87

Distributed Database Management System (DDBMS)

Introduction Data management has been a headache to many technology enthusiasts for quite a long period of time. They have successfully managed to logically collect interrelated data and share it. If the data is...

Words: 799

Pages: 3

Views: 128

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration