1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
max2010maxim [7]
4 years ago
8

An administrator has been working within an organization for over 10 years. He has moved between different IT divisions within t

he company and has retained privileges from each of the jobs that he's had during his tenure. Recently, supervisors admonished him for making unauthorized changes to systems. He once again made an unauthorized change that resulted in an unexpected outage and management decided to terminate his employment at the company. He came back to work the following day to clean out his desk and belongings, and during this time he installed a malicious script that was scheduled to run as a logic bomb on the first day of the following month. The script will change administrator passwords, delete files, and shut down over 100 servers in the datacenter. What could have discovered problems with this user's account while he was employed
Computers and Technology
1 answer:
rodikova [14]4 years ago
5 0

Answer:

User roles and access authorization

(Explanation of this question is given below in the explanation section.

Explanation:

As noted in question that a terminated employee comeback in office and installed some malicious script on a computer that was scheduled to run a logic bomb on the first day of the following month. And, that script will change administrator passwords, delete files, and shut down over 100 servers in the data center.

The following problem can be with that account

  • Unauthorized user access and privileges

The user may be given unauthorized access to system resources. If a user has unauthorized access to system resource then he can modify or destroy the system function easily.

  • The firewall may be disabled to detect the malicious script

The firewall should be enabled to detect such types of attack from unauthorized access to the system

  • Role

May be user role is not defined properly. If role would be defined according to user role then there are very fewer chances in doing unauthorized changes in the system that will result in an unexpected outage.

You might be interested in
Earthquakes with magnitudes between 1.0 and 2.9 on the Richter scale are
NeX [460]
They're not dangerous. However, they do cause mild tremors.
3 0
3 years ago
Which of the following best describes professional behavior in the IT field?
Ray Of Light [21]
Answer - teaching others about technology in order to increase IT knowledge in the community
4 0
3 years ago
Does anyone know how to delete a question you put up? I'll give you 20 points.
Rudik [331]
Answer: I don’t believe you can unless someone reports it.
3 0
3 years ago
5 band resistor with two red bands, two gold bands, one purple band?
Mamont248 [21]

According to below picture, two gold bands on a 5 band resistor cannot happen. What is the order of the bands?

8 0
3 years ago
When making an assembly of design what command is most.commonly used?
Schach [20]
There are two common command lines used in creating design assembly. The 'push' and 'pull' command. Both allows you to get parts from the original predelivered content's source desgian    and recreate the design faster and with less memory.
6 0
3 years ago
Other questions:
  • Num = int(input("Enter a number: "))
    5·2 answers
  • Which structure does a web page normally use to define an area of focus?
    8·1 answer
  • How can you create the first row of the table as the header of the table
    15·2 answers
  • You friends parents are worried about going over their budget for the month. Which expense would you suggest is NOT a need?
    10·1 answer
  • The best-known communications protocol is probably smtp, which regulates internet data transport. _________________________
    6·1 answer
  • Match the tool to the task it helps to accomplish. Thesaurus allows the user to find the synonyms and antonyms of a word Smart L
    8·1 answer
  • You receive an e-mail that seems to come from your bank. Clicking on a link in the message takes you to a website that seems to
    8·2 answers
  • Taylor develops a prototype for a new smartphone. It only includes code, a way to process the input, a memory card, and a microp
    11·2 answers
  • 37) Which of the following statements is true
    14·1 answer
  • Question # 2 Multiple Choice Which finger presses the H key on the keyboard? index finger on the right hand index finger on the
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!