CHAPTER 19
Privilege Management
In this chapter, you will
- Learn the differences between user, group, and role management
- Explore password policies
- Discover the advantage of single sign-ons
- Understand the pros and cons of centralized versus decentralized privilege management
- Learn about different auditing types (privilege, usage, and escalation)
- Explore methods of managing access (MAC, DAC, and RBAC)
- Discuss rights and privileges under Windows operating systems
Computer systems are in such wide use now that they touch almost every facet of our lives: they process credit card transactions, handle airline reservations, store a vast amount of personal information, and manage car engines to ensure optimal fuel efficiency. Most of the time, computers—particularly ...
Get CompTIA Security+ All-in-One Exam Guide (Exam SY0-301), 3rd Edition, 3rd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.