Adversaries may interrupt availability of system and network resources by inhibiting access to accounts utilized by legitimate users. Accounts may be deleted, locked, or manipulated (ex: credentials changed) to remove access to accounts.
Users should be taught that Device Administrator permissions are very dangerous, and very few applications need it.
|ID||Data Source||Data Component|
|DS0041||Application Vetting||Permissions Requests|
Application vetting services could closely scrutinize applications that request Device Administrator permissions.