Chapter Summary

This chapter examined the process of managing security. We discussed privilege management, focusing first on users, groups, and roles for maintaining and assigning privileges. We also discussed the concept of single sign-on and its benefits in the complexity of the modern network environment. Centralized and decentralized network management principles and concepts were also discussed, and we highlighted the fact that centralized networks tend to be more secure but less scalable and that decentralized networks are the opposite. Finally, we examined privilege management and the idea of auditing users and their use of privilege. In each case, where appropriate, we illustrated how to accomplish the tasks with step-by-step instructions. ...

Get Security+ Training Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.