Protecting yourself in the Cyber Arena – Understanding Admin rights

Step 1 – Understanding Admin rights
More important: Who has them, and why they(you) don’t need them.

Let's start at the very beginning: What exactly are Admin rights (or Admin privileges /Access)?
Admin rights are the ultimate access to a given resource in a computerized environment.
It means that the one that has Admin rights, can do whatever he wants with that specific resource.
A resource on a computer can be a lot of things, for example, it can be a file (doc, spreadsheet and similar), a folder, a program/application/game/ configuration changes and it can even be the Computer itself.

A resource on a Network can be all of the above, plus it can also be a trillion more things, a minor example can be: Network folders, files or shares, database, apps, web apps, printers, cameras, camera server…. and so much more, as much as you can imagine.
Everything in the computer world every object, has an access right: when you interact with an object, the level of rights that you have, determined what you can do with that object. Admin level rights allow you to do whatever you want to do with that object.
So, it is obvious that if I want to do something bad, I will want to get Admin rights, that way I can delete it, encrypt it, spy on it or simply send it to the highest bidder (bank account password for example)

What can be done in order to prevent hackers from gaining Admin rights? There are numerous ways that hackers can gain them, they can for example use Mimikats: (see my recent blog post about Mimikatz) and there are numerous other ways of doing it. The hacker's primary goal is to gain these admin rights.

If you want to thwart the hackers' plan to get your Admin rights, all it takes is one simple thing… Don’t Use Admin Rights!!!

Almost every home user, uses a User that has full admin over his computer!
Almost every employee, uses a User that has full admin over his computer!
The catch is this: They, you, me… we don’t need to use admin rights, we need to know it, but we don’t need to use it as our primary User (even if you are Sysadmins) – and employees don’t really need to know it or user it…ever...

The reason is simple: every attack that steals the password or credential, relies on the currently logged user privileges. If that user doesn’t have the necessary privileges, the attack will fail, and the admin rights remains unobtained.
In the meantime, your own work remains unhampered. Almost everything you do on your computer does not require Admin Rights, and when it does (installing new software, for instance), the computer will ask you for them, and you can use them freely since the attacker can steal them.
Do not be mistaken, there are many other forms of attack, but by not using the admin privileges, you will render most of the attacks obsolete.

In an ever-changing cyber arena, you always need to keep up to date, always install top of the line defense programs, a greatly recommended one that can deal with a future and unknown like the Cyber 2.0 System.

And Always, Always!!! Backup!!!

Next upcoming blog post: - Backing up in the new Cyber Arena: The Good the Bad and the Ugly…

Comments

Popular posts from this blog

Cyber 2.0 vs Traditional antivirus and Organizational Firewall

Cyber ​​2.0 introduces: "Work in Time of Corona"