ExamGecko
Question list
Search
Search

Related questions











Question 550 - CISA discussion

Report
Export

An organization has implemented a distributed security administration system to replace the previous centralized one. Which of the following presents the GREATEST potential concern?

A.
Security procedures may be inadequate to support the change
Answers
A.
Security procedures may be inadequate to support the change
B.
A distributed security system is inherently a weak security system
Answers
B.
A distributed security system is inherently a weak security system
C.
End-user acceptance of the new system may be difficult to obtain
Answers
C.
End-user acceptance of the new system may be difficult to obtain
D.
The new system will require additional resources
Answers
D.
The new system will require additional resources
Suggested answer: A

Explanation:

A distributed security administration system is a system that allows different administrators to manage the security of different parts of the network or organization. This can provide more flexibility, scalability, and efficiency than a centralized system, where one administrator is responsible for the entire security. However, a distributed security administration system also presents some potential challenges and risks, such as:

Inconsistency and conflict among different security policies and standards

Lack of coordination and communication among different administrators

Difficulty in monitoring and auditing the overall security status and performance

Increased complexity and cost of security management and maintenance

Therefore, the greatest potential concern for implementing a distributed security administration system is that the security procedures may be inadequate to support the change. Security procedures are the rules and guidelines that define how security is implemented and enforced in an organization. They include policies, standards, processes, roles, responsibilities, controls, and metrics. Security procedures should be aligned with the business objectives, risks, and requirements of the organization, as well as the best practices and regulations in the industry. Security procedures should also be reviewed and updated regularly to reflect the changes in the environment, technology, and threats.

If the security procedures are not adequate to support the change from a centralized to a distributed security administration system, the organization may face increased security risks, such as unauthorized access, data breaches, compliance violations, reputation damage, and financial losses. Therefore, it is essential to ensure that the security procedures are revised and adapted to suit the new system, and that they are communicated and enforced effectively across the organization.

1: Security in Distributed System - GeeksforGeeks

2: Distributed System Security Architecture - Wikipedia

3: Distributed Systems Security: Issues, Processes and Solutions

asked 18/09/2024
Arun Samuel
41 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first