Centralized vs. Decentralized Management
In the world of telecommunications and computers, there is almost always more than one way to accomplish a goal. Coincidentally, several schools of thought exist as to why one method is better than the other. This is especially true of security and privilege management. Regardless of how vast or minute your computer deployment, you will have to manage the rights and privileges of the users and processes using those systems. The two main approaches to rights and privilege management are centralized and decentralized.
Centralized Management
Centralized management brings the authority and responsibility for managing and maintaining rights and privileges into a single group, location, or area. To illustrate, ...
Get CompTIA Security+ All-in-One Exam Guide (Exam SY0-301), 3rd Edition, 3rd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.