Access control is defined as a mechanism or security method to control and regulate the access of work, data and grants permission for accessing and using resources in technological environment. Generally in the environment of working on a database, a user is requested to enter his login credentials to a system and go through the authentication process to verify the user authenticity. After the authentication process, access control security system executes and it matches the user login id with the database of access control to keep a check on the user operations and refrain the user from accessing the services which are locked for the user credentials. Access control can also be defined as a way to restrict access by the means of virtual and physical way to a system. In language of computers, access control is a mechanism by which either users are restricted or granted permission for the access of information and resources.
How access control function? Access control is the passage through which information flows between a subject and an object. A subject is classified as an active unit that seek permission for accessing the data within the object such as a process or user defined programs. An object is classified as a passive unit that holds the required resources and information such as a program, file, computer or a database. Importance of access control The importance and benefits of access control are in both physical and logical form. For example the proximity cards and proximity key fobs provides access control in a convenient physical form of small size devices. Access control protect systems from unauthorized users and hackers attack. It restrict and monitor the administrator usage. It protects the system by suspending the account due to several unsuccessful login attempts. It deletes the user accounts which are obsolete and non-functional as the user left the organization. Access control system impose authoritarian access rules. It disables the usage of unwanted services, ports and features. It sets up rules for setting the desired password such as content, password active duration, length, storage, etc. for security purpose and also implements rotation of passwords. Access control mechanism create audit logs and also conducts periodical auditing of work and generate required reports.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |