O'Reilly logo

CompTIA Security+ All-in-One Exam Guide, Third Edition by Chuck Cothren, Roger Davis, Dwayne Williams, Gregory White, Wm. Arthur Conklin

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Centralized vs. Decentralized Management

In the world of telecommunications and computers, there is almost always more than one way to accomplish a goal. Coincidentally, several schools of thought exist as to why one method is better than the other. This is especially true of security and privilege management. Regardless of how vast or minute your computer deployment, you will have to manage the rights and privileges of the users and processes using those systems. The two main approaches to rights and privilege management are centralized and decentralized.

Centralized Management

Centralized management brings the authority and responsibility for managing and maintaining rights and privileges into a single group, location, or area. To illustrate, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required