Under what circumstances should access controls be centralized as opposed to decentralized?

What will be an ideal response?

One area of discussion among practitioners is whether access controls should be centralized or decentralized. A collection of users with access to the same data typically has a centralized access control authority, even under a DAC model. The level of centralization appropriate to a given situation varies by organization and the type of information protected. The less critical the protected information, the more controls tend to be decentralized. When critical information assets are being protected, the use of a highly centralized access control toolset is indicated.

Computer Science & Information Technology

You might also like to view...

Which of the following statements is false?

a. When an Activity hosts Fragments and the Activity is resumed, all of its Fragments’ onResume methods are called. b. An Activity’s onPause method is called when another Activity receives the focus, which pauses the one that loses the focus and sends it to the background. c. When an Activity hosts Fragments and the Activity is paused, all of its Fragments’ onPause methods are called. d. When an app is paused, it should ensure that listeners for sensor events are still active.

Computer Science & Information Technology

____________________ is a filtering process that helps agents quickly identify and respond to simple requests for information to expedite an incident.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology