Weitere Beispiele werden automatisch zu den Stichwörtern zugeordnet - wir garantieren ihre Korrektheit nicht.
Not holding privileges until actually required is in keeping with the Principle of least privilege.
The principle of least privilege, where each part of the system has only the privileges that are needed for its function.
This violates the principle of least privilege if a user does not absolutely require access to the entire Internet.
This rule is an application of the Principle of least privilege to protocol design.
An important logical control that is frequently overlooked is the principle of least privilege.
As with other operating systems, Windows users are able to follow the principle of least privilege and use non-administrator accounts.
Weak tranquility is desirable as it allows systems to observe the principle of least privilege.
Also, it is very important that everything works with the least amount of privileges possible (principle of least privilege).
Principle of least privilege (computer security) These operating systems are specially designed to deal with limited processing power, size and memory constrains.
PolicyKit is also being widely implemented into the desktop to further harden the system through the principle of least privilege.
See Principle of least privilege.
The principle of least privilege requires that an individual, program or system process is not granted any more access privileges than are necessary to perform the task.
Implement the security principle of least privilege by removing the requirement for end-users to have Administrator privileges in order to run poorly written applications.
Two design principles are balanced here: the principle of least privilege and a desire to minimize the need to develop and maintain complex access control rules.
A large amount of existing software doesn't run well as a standard user, due to developers not implementing the principle of least privilege in their design and testing.
Furthermore, Windows Installer facilitates the principle of least privilege by performing software installations by proxy for unprivileged users.
The installation task is made easier if the principle of least privilege is not applied, since the rootkit then does not have to explicitly request elevated (administrator-level) privileges.
A blatant example of the failure to adhere to the principle of least privilege is logging into Windows as user Administrator to read Email and surf the Web.
The principle of least privilege is widely recognized as an important design consideration in enhancing the protection of data and functionality from faults (fault tolerance) and malicious behavior (computer security).
Applying security patches, implementing the principle of least privilege, reducing the attack surface and installing antivirus software are some standard security best practices that are effective against all classes of malware.
The principle of least privilege suggests that a least user access (LUA) approach should be taken, in that users should not use accounts with more privileges than necessary to complete the task at hand.
In a global environment system (where there's some shared variable), the protected procedure mechanism allows the enforcement of the principle of least privilege and the avoidance of side effects in resources management (see Denning principles).
This prevents the child authentication process from interfering with the parent except through a narrowly defined inter-process communication API, a technique inspired by the principle of least privilege and known as privilege separation.
There is also a variant called "rjoe", which is restricted in that it allows one to edit only the files specified on the command line (which can be useful to enforce the principle of least privilege).
In the context of security the minimality principle of microkernels is a direct consequence of the principle of least privilege, according to which all code should have only the privileges needed to provide required functionality.