which is controlled directly by the owners and creators of files.What is the major advantage and disadvantage of such an approach?

Your office is implementing an access control policy based on decentralizedadministration, which is controlled directly by the owners and creators of files.What is the major advantage and disadvantage of such an approach?

Your office is implementing an access control policy based on decentralizedadministration, which is controlled directly by the owners and creators of files.What is the major advantage and disadvantage of such an approach?

A.
It puts access control into the hands of those most accountable for the information, but requires security labels for enforcement.

B.
It puts access control into the hands of those most accountable for the information, but leads to inconsistencies in procedures and criteria.

C.
It puts access control into the hands of IT administrators, but leads to procedures and criteria that are too rigid and inflexible.

D.
It puts access control into the hands of IT administrators, but forces them to overly rely upon the file owners to implement the access controls IT puts in place.

Explanation:
A decentralized access control administration method gives control of access to the people closer to the resources-the people who may better understand who should and should not have access to certain files, data, and resources. In this approach, it is often the functional manager who assigns access control rights to employees. An organization may choose to use a decentralized model if its managers have better
judgment regarding which users should be able to access different resources, and there is no business requirement that dictates strict control through a centralized body is necessary.



Leave a Reply 2

Your email address will not be published. Required fields are marked *