Professional Documents
Culture Documents
Learning Journal Unit 4
Learning Journal Unit 4
Organizations can govern who has access rights to company data and resources through the data
security procedure known as access control. Secure access control employs procedures that make
sure users are who they say they are and guarantee they are given the proper degrees of access
My access was restricted when I was a child because my parent had a method of
controlling the television network's channels. Some channels were blocked for us kids and had
no way to be unblocked because only my parent knew the password; additionally, during exam
season at school, all the channels go out of commission and the only channel we can watch is the
Before access is allowed, a decent access control system has to include several components, such
as authentication and authorization. Some organizations go one step further and are able to
remove some of these requirements for their users. (What Is Access Control? - Network
Before the COVID shutdown, there was an event that I still clearly recall happening at
work. All employees needed an access card to enter any office department, and as a result,
information about who visits an office is known. The IT department was contacted to check the
cctv to see if the stolen item can be traced on this very particular day when there was a case of a
stolen laptop of one of the staff members. To cut a long story short, the cctv tried its best but we
only saw the image of the person but not his face because he was smart and well aware of the
cctv, the only thing that saved the day was that when we looked at the precise time the cctv
caught the person and the specific staff member who used the access card to open the door at that
time, we discovered that it was the company's fired manager who entered the building during
lunch hour when nobody was in the office and fled with the laptop.
In conclusion, access control is crucial for both businesses and people. The majority of us
have password-protected our social media accounts and even our phones so that only the owner
Reference