From the course: Ethical Hacking: System Hacking

Unlock the full course today

Join today to access over 24,900 courses taught by industry experts.

Defending against privilege escalation

Defending against privilege escalation

From the course: Ethical Hacking: System Hacking

Defending against privilege escalation

- [Instructor] By understanding how malicious actors escalate the privilege of a user, system administrators are better prepared to protect their own systems. In this segment, we'll take a look at ways to lock down a system and defend against privilege escalation. Once a malicious actor has escalated privileges to the administrator level, a great deal of damage can be done. Therefore, the goal is to be vigilant and defend against privilege escalation. Let's talk about a few recommended guidelines to prevent unauthorized access and minimize the risk of malicious activities. First, let's talk about securing system access. In this case, the one thing we can do is to restrict interactive login privileges. Now, interactive privileges are an important part of a user's profile in a networked environment as they define how they can interact with the systems resources. The some best practice methods include limit physical and remote access to authorized users only. Implement strong password…

Contents