Professional Documents
Culture Documents
Security Management
BY: CONNOR TYGER
Access Control
In the fields of physical security and information security, access control is the
selective restriction of access to a place or other resource
People, computer programs, and even computers that process the information
must all be authorized
The more sensitive or valuable the information, the stronger the control
mechanisms should be
Access control is usually taken care of in three steps, which are identification,
authentication, and authorization
Challenges in Access Control
1. The least expensive, but least secure method is using something a person knows
Passwords or a PIN
2. An expensive, but secure option is using something a person has, such as an
access card
3. The most expensive, but most secure method is using the people themselves,
with biometrics
The strongest authentication, referred to as two factor authentication, includes two
of these three methods
Access Control Policies and Procedures
Fences
Locks
Badge system
Guards
Biometrics
Proper lighting
Motion detectors
Alarms
Backups
Examples of Technical Controls
Encryption
Antivirus software
Firewalls
Routers
Protocols to preserve confidentiality and integrity of data
Protocols to enforce specific paths for communication to take place
Access Control Administration
https://www.youtube.com/watch?v=W88KqijwUP4
Works Cited