Prevent Unauthorized Access/Change Activities on Information Technology (IT) during COVID-19 pandemic lockdown

Abdullah M. Al-Shaikh, Khalid A. Al-Khathlan

Abstract: The global experiences during the COVID-19 pandemic lockdown has suddenly created a huge demand and accelerated the investment at an unprecedented scale toward technologies that support off-premises workplace. The demand for strong remote access management has never been so great, especially for privilege users who need perform administrative operations from home or third-party.

This article will shed light on practical recommendations that will help to enhance the IT change management process in alignment with information protection to prevent unauthorized change activities on information technology infrastructure. The recommendations will help to eliminate business interruption due to unplanned or unauthorized changes activities and will minimize/eliminate the impact in case of a cyber-attack.

Keywords: COVID-19, PAM, IAM, Just-in-time, JIT, Cyber-Attack, IT Change Management, . Information Security, Risk Management.

Title: Prevent Unauthorized Access/Change Activities on Information Technology (IT) during COVID-19 pandemic lockdown

Author: Abdullah M. Al-Shaikh, Khalid A. Al-Khathlan

International Journal of Computer Science and Information Technology Research

ISSN 2348-1196 (print), ISSN 2348-120X (online)

Research Publish Journals

Vol. 9, Issue 3, July 2021 - September 2021

Citation
Share : Facebook Twitter Linked In

Citation
Prevent Unauthorized Access/Change Activities on Information Technology (IT) during COVID-19 pandemic lockdown by Abdullah M. Al-Shaikh, Khalid A. Al-Khathlan