Under what circumstances should access controls be centralized as opposed to decentralized?
What will be an ideal response?
One area of discussion among practitioners is whether access controls should be centralized or decentralized. A collection of users with access to the same data typically has a centralized access control authority, even under a DAC model. The level of centralization appropriate to a given situation varies by organization and the type of information protected. The less critical the protected information, the more controls tend to be decentralized. When critical information assets are being protected, the use of a highly centralized access control toolset is indicated.
You might also like to view...
What are small objects such as text boxes, buttons, and labels that let users interact with the form?
A. Record sources B. Subforms C. User views D. Controls
Holding down the Alt key while selecting cells allows you to select non-adjacent ranges
Indicate whether the statement is true or false
A slide layout can be ________ to help identify its purpose for users
Fill in the blank(s) with correct word
Convert to ________ located on the Design tab is used to convert a table to data
Fill in the blank(s) with correct word