No edit summary |
m (→Overview) Tag: sourceedit |
||
(5 intermediate revisions by the same user not shown) | |||
Line 1: | Line 1: | ||
+ | == Definition == |
||
⚫ | |||
+ | |||
⚫ | |||
{{Quote|advanced level of [[access]] to a [[computer]] or [[application]] that includes the ability to perform significant [[configuration]] changes to the [[computer]]'s [[operating system]].}} |
{{Quote|advanced level of [[access]] to a [[computer]] or [[application]] that includes the ability to perform significant [[configuration]] changes to the [[computer]]'s [[operating system]].}} |
||
+ | |||
+ | == Overview == |
||
+ | |||
+ | "An [[intruder]] with 'root level access' has the highest [[privileges]] given to a [[user]] working with an [[operating system]] or other [[program]] and has as much authority on the [[network]] as a [[system administrator]], including the [[authority]] to [[access]] [[file]]s, alter [[permission]]s and [[privileges]], and add or remove [[account]]s." |
||
== Source == |
== Source == |
||
− | + | * [[NIST Special Publication 800-40]], Ver. 2. |
|
[[Category:Security]] |
[[Category:Security]] |
||
+ | [[Category:Definition]] |
Latest revision as of 20:13, 12 May 2015
Definition[]
Administrative access (also referred to as privileged access or root level access) is an
“ | advanced level of access to a computer or application that includes the ability to perform significant configuration changes to the computer's operating system. | ” |
Overview[]
"An intruder with 'root level access' has the highest privileges given to a user working with an operating system or other program and has as much authority on the network as a system administrator, including the authority to access files, alter permissions and privileges, and add or remove accounts."
Source[]
- NIST Special Publication 800-40, Ver. 2.