From the course: Ethical Hacking: System Hacking
Unlock the full course today
Join today to access over 24,900 courses taught by industry experts.
Defending against privilege escalation
From the course: Ethical Hacking: System Hacking
Defending against privilege escalation
- [Instructor] By understanding how malicious actors escalate the privilege of a user, system administrators are better prepared to protect their own systems. In this segment, we'll take a look at ways to lock down a system and defend against privilege escalation. Once a malicious actor has escalated privileges to the administrator level, a great deal of damage can be done. Therefore, the goal is to be vigilant and defend against privilege escalation. Let's talk about a few recommended guidelines to prevent unauthorized access and minimize the risk of malicious activities. First, let's talk about securing system access. In this case, the one thing we can do is to restrict interactive login privileges. Now, interactive privileges are an important part of a user's profile in a networked environment as they define how they can interact with the systems resources. The some best practice methods include limit physical and remote access to authorized users only. Implement strong password…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.