CHAPTER 19

Privilege Management

In this chapter, you will

  • Learn the differences between user, group, and role management
  • Explore password policies
  • Discover the advantage of single sign-ons
  • Understand the pros and cons of centralized versus decentralized privilege management
  • Learn about different auditing types (privilege, usage, and escalation)
  • Explore methods of managing access (MAC, DAC, and RBAC)
  • Discuss rights and privileges under Windows operating systems

Computer systems are in such wide use now that they touch almost every facet of our lives: they process credit card transactions, handle airline reservations, store a vast amount of personal information, and manage car engines to ensure optimal fuel efficiency. Most of the time, computers—particularly ...

Get CompTIA Security+ All-in-One Exam Guide (Exam SY0-301), 3rd Edition, 3rd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.