CB- Access Control Lesson

Access Control

Who should access data? How do you make sure those who attempt access have actually been granted that access? Under which circumstances do you deny access to a user with access privileges? In this lesson you are able to identify the components of access control to understand its importance in society.

Cyber Attacks which likely started with a weak password and stolen credentials has underlined the importance of having adequate measures in place and a strong cyber security culture. People can be a vital part of this, whether it is because they click on a link in a phishing email or hold a door open to an intruder who follows them into an office building. That is why access control is at the very heart of cyber security. Access control which depends on an entity being sure that users are who they say they are and that they have permission to utilize specific network resources or to enter restricted areas. Not only does access control serve to secure assets, but it can also help to trace actions and to determine the cause.

In the fields of physical security and information security, access control is the selective restriction of access to a place or other resource, while access management describes the process. The act of accessing may mean consuming, entering, or using. Permission to access a resource is called authorization.

Locks and login credentials are examples of mechanisms of access control. So just think when you are accessing your email or logging into your favorite gaming community. These access controls ensure that you are the correct user.

Now let's take a moment to click through the Access Controls learning object to better understand the services access control provides.

To continue to ensure that our network maintains a safeguard we have to be conscious of the mechanism and implementation is essential.

[CC BY 4.0] UNLESS OTHERWISE NOTED | IMAGES: LICENSED AND USED ACCORDING TO TERMS OF SUBSCRIPTION