The IT Law Wiki
No edit summary
Tag: sourceedit
 
(5 intermediate revisions by the same user not shown)
Line 1: Line 1:
  +
== Definition ==
'''Administrative access''' (also referred to as '''privileged access''' or '''root access''') is an
 
  +
 
'''Administrative access''' (also referred to as '''privileged access''' or '''root level access''') is an
   
 
{{Quote|advanced level of [[access]] to a [[computer]] or [[application]] that includes the ability to perform significant [[configuration]] changes to the [[computer]]'s [[operating system]].}}
 
{{Quote|advanced level of [[access]] to a [[computer]] or [[application]] that includes the ability to perform significant [[configuration]] changes to the [[computer]]'s [[operating system]].}}
  +
  +
== Overview ==
  +
  +
"An [[intruder]] with 'root level access' has the highest [[privileges]] given to a [[user]] working with an [[operating system]] or other [[program]] and has as much authority on the [[network]] as a [[system administrator]], including the [[authority]] to [[access]] [[file]]s, alter [[permission]]s and [[privileges]], and add or remove [[account]]s."
   
 
== Source ==
 
== Source ==
   
[[NIST]], "Creating a Patch and Vulnerability Management Program," [[NIST Special Publication 800-40]], Ver. 2 (Jan. 2006).[http://csrc.nist.gov/publications/nistpubs/800-40-Ver2/SP800-40v2.pdf]
+
* [[NIST Special Publication 800-40]], Ver. 2.
 
[[Category:Security]]
 
[[Category:Security]]
  +
[[Category:Definition]]

Latest revision as of 20:13, 12 May 2015

Definition[]

Administrative access (also referred to as privileged access or root level access) is an

advanced level of access to a computer or application that includes the ability to perform significant configuration changes to the computer's operating system.

Overview[]

"An intruder with 'root level access' has the highest privileges given to a user working with an operating system or other program and has as much authority on the network as a system administrator, including the authority to access files, alter permissions and privileges, and add or remove accounts."

Source[]