You are on page 1of 2

LEARNING JOURNAL UNIT 4

Organizations can govern who has access rights to company data and resources through the data

security procedure known as access control. Secure access control employs procedures that make

sure users are who they say they are and guarantee they are given the proper degrees of access

control. (What Is Access Control? - Network Cybersecurity Systems, 2022)

My access was restricted when I was a child because my parent had a method of

controlling the television network's channels. Some channels were blocked for us kids and had

no way to be unblocked because only my parent knew the password; additionally, during exam

season at school, all the channels go out of commission and the only channel we can watch is the

channel for our notebook and textbooks.

Before access is allowed, a decent access control system has to include several components, such

as authentication and authorization. Some organizations go one step further and are able to

remove some of these requirements for their users. (What Is Access Control? - Network

Cybersecurity Systems, 2022)

Before the COVID shutdown, there was an event that I still clearly recall happening at

work. All employees needed an access card to enter any office department, and as a result,

information about who visits an office is known. The IT department was contacted to check the

cctv to see if the stolen item can be traced on this very particular day when there was a case of a

stolen laptop of one of the staff members. To cut a long story short, the cctv tried its best but we

only saw the image of the person but not his face because he was smart and well aware of the

cctv, the only thing that saved the day was that when we looked at the precise time the cctv
caught the person and the specific staff member who used the access card to open the door at that

time, we discovered that it was the company's fired manager who entered the building during

lunch hour when nobody was in the office and fled with the laptop.

In conclusion, access control is crucial for both businesses and people. The majority of us

have password-protected our social media accounts and even our phones so that only the owner

may access certain items.

Reference

What Is Access Control? - Network Cybersecurity Systems. Fortinet. (2022). Retrieved 30

September 2022, from https://www.fortinet.com/resources/cyberglossary/access-control.

You might also like