Under what circumstances should access controls be centralized as opposed to decentralized?

What will be an ideal response?


One area of discussion among practitioners is whether access controls should be centralized or decentralized. A collection of users with access to the same data typically has a centralized access control authority, even under a DAC model. The level of centralization appropriate to a given situation varies by organization and the type of information protected. The less critical the protected information, the more controls tend to be decentralized. When critical information assets are being protected, the use of a highly centralized access control toolset is indicated.

Computer Science & Information Technology

You might also like to view...

What are small objects such as text boxes, buttons, and labels that let users interact with the form?

A. Record sources B. Subforms C. User views D. Controls

Computer Science & Information Technology

Holding down the Alt key while selecting cells allows you to select non-adjacent ranges

Indicate whether the statement is true or false

Computer Science & Information Technology

A slide layout can be ________ to help identify its purpose for users

Fill in the blank(s) with correct word

Computer Science & Information Technology

Convert to ________ located on the Design tab is used to convert a table to data

Fill in the blank(s) with correct word

Computer Science & Information Technology