create account

Cybersecurity: why an Access Control Audit should be conducted for personal devices by lebey1

View this thread on: hive.blogpeakd.comecency.com
· @lebey1 ·
$1.87
Cybersecurity: why an Access Control Audit should be conducted for personal devices
<div class="text-justify"> 

![domenico-loia-EhTcC9sYXsw-unsplash.jpg](https://cdn.steemitimages.com/DQmRpc8AzHno3J81DPnfnRS3JhxUheHYKU3Tgwi3qacTyqe/domenico-loia-EhTcC9sYXsw-unsplash.jpg)
 <center>[source](https://unsplash.com/photos/EhTcC9sYXsw)</center>

Cybersecurity involves all assets linked to the internet, so auditing your device on your own will help prevent breaches. Conducting an access control audit on your information assets will help tighten the security of your accounts and assets online. Also, this way, you get to know what to do just in case an unauthorized person has access to your account. 

So what's this Access control audit about; well, it is the security audit that involves checking for compliance with the logical access rights given to an account, password management, review access rights, management of privileged accounts, logging of activities, removal of access rights and access to source codes and information access restrictions. 

The list is more extensive than listed here; however, not all apply when conducting an audit for personal information assets from your home. A business Access control Audit will surely contain more, as there are many accounts, users, domains and departments in an average business setup. 


![fly-d-C5pXRFEjq3w-unsplash.jpg](https://cdn.steemitimages.com/DQmXYVBxvHxwHCmaPczLPtMuHz2j55QgRTbX2787Ne1ggYG/fly-d-C5pXRFEjq3w-unsplash.jpg)



 <center>[source](https://unsplash.com/photos/C5pXRFEjq3w)</center>

So conducting a logical access rights review for your personal information asset will require checking all the devices currently connected to your account. If a device you are no longer using or an unauthorized device is connected to your account, such a device needs to be removed/disabled. This way, such a device will not have access to your account. 

Activities conducted on an account should be logged, making monitoring the account more effectively and efficiently easier. Also, reviewing all the activity logs is great as this helps you check for irregularities and easily spot an action that might have been conducted on your account without your awareness. This way, you can track the activities and block the hacker's access easily. 

Password management is an issue that affects all devices, and personal devices are no exception. Some personal devices have been using one password for years. The audit tilts the users toward changing their password either Quarterly or ensuring that the good password traits are inherited. Examples are not writing down a password and the password being Alpha-Numerical with a combination of symbols and not less than eight characters. 

The developers working on a personal project should ensure that codes are stored in a repository and that they are the only ones with access to those codes. Also, any change made to a code should be logged, and that new code should have a new version number of its own. Versioning should be done for all codes. 

</div>
👍  , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , and 52 others
properties (23)
authorlebey1
permlinkcybersecurity-why-an-access-control-audit-should-be-conducted-for-personal-devices
categoryneoxian
json_metadata{"app":"peakd/2023.3.4","format":"markdown","tags":["neoxian","leofinance","ctp","blogging","hive","cybersecurity","bdvoter","ocd","piotr"],"users":[],"image":["https://cdn.steemitimages.com/DQmRpc8AzHno3J81DPnfnRS3JhxUheHYKU3Tgwi3qacTyqe/domenico-loia-EhTcC9sYXsw-unsplash.jpg","https://cdn.steemitimages.com/DQmXYVBxvHxwHCmaPczLPtMuHz2j55QgRTbX2787Ne1ggYG/fly-d-C5pXRFEjq3w-unsplash.jpg"]}
created2023-03-27 12:11:54
last_update2023-03-27 12:11:54
depth0
children0
last_payout2023-04-03 12:11:54
cashout_time1969-12-31 23:59:59
total_payout_value0.948 HBD
curator_payout_value0.924 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length2,984
author_reputation89,357,875,535,318
root_title"Cybersecurity: why an Access Control Audit should be conducted for personal devices "
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id122,006,598
net_rshares3,442,117,795,015
author_curate_reward""
vote details (116)