100 relations: Access badge, Access control list, Access Control Matrix, Accountability, Alarm device, Alarm management, Attribute-based access control, Audit trail, Authentication, Authorization (computer access control), Automated information system, Bank vault, Barbed tape, Biometrics, Bioscrypt Inc., Bluetooth low energy, Border guard, Bouncer (doorman), Capability-based security, Card reader, Castle, Common Access Card, Computer security, Contactless smart card, Credential, Current loop, Data, Data storage device, Discretionary access control, Door, Door security, Electronic lock, Federal Standard 1037C, Fence, Fingerprint recognition, Fortification, Identity document, Identity management, Identity-based security, Information security, Internet Protocol, IP access controller, IP reader, Key management, Keychain, Lock (security device), Lock bumping, Lock picking, Logical security, Login, ..., Magnetic stripe card, Malware, Mandatory access control, Mantrap (access control), MIL-STD-188, Multi-factor authentication, National Information Assurance Glossary, Near field communication, Object-capability model, OpenID, Optical turnstile, Organisation-based access control, Password, Photo identification, Physical security, Physical security information management, Physical Security Professional, Policy, Principle of least privilege, Prison, Proof-of-payment, Proximity card, Resource, Role-based access control, RS-485, Safe, Safe-cracking, Security, Security alarm, Security engineering, Security lighting, Security management, Security policy, Server room, Shon Harris, Smart card, Social control, System, Telecommunication, Terminal server, Ticket (admission), Trusted system, Turnstile, Two-factor authentication, User (telecommunications), Vertical service code, Wiegand effect, Wiegand interface, XACML, .htaccess. Expand index (50 more) » « Shrink index
An access badge is a credential used to gain entry to an area having automated access control entry points.
New!!: Access control and Access badge ·
An access control list (ACL), with respect to a computer file system, is a list of permissions attached to an object.
In computer science, an Access Control Matrix or Access Matrix is an abstract, formal security model of protection state in computer systems, that characterizes the rights of each subject with respect to every object in the system.
In ethics and governance, accountability is answerability, blameworthiness, liability, and the expectation of account-giving.
New!!: Access control and Accountability ·
An alarm device or system of alarm devices gives an audible, visual or other form of alarm signal about a problem or condition.
New!!: Access control and Alarm device ·
Alarm management is the application of human factors (or 'ergonomics') along with instrumentation engineering and systems thinking to manage the design of an alarm system to increase its usability.
New!!: Access control and Alarm management ·
Attribute-based access control (ABAC) defines an access control paradigm whereby access rights are granted to users through the use of policies which combine attributes together.
An audit trail (also called audit log) is a security-relevant chronological record, set of records, and/or destination and source of records that provide documentary evidence of the sequence of activities that have affected at any time a specific operation, procedure, or event.
New!!: Access control and Audit trail ·
Authentication (from authentikos, "real, genuine," from αὐθέντης authentes, "author") is the act of confirming the truth of an attribute of a single piece of data (a datum) claimed true by an entity.
New!!: Access control and Authentication ·
Authorization or authorisation is the function of specifying access rights to resources related to information security and computer security in general and to access control in particular.
An automated information system (AIS) is an assembly of computer hardware, software, firmware, or any combination of these, configured to accomplish specific information-handling operations, such as communication, computation, dissemination, processing, and storage of information.
A bank vault (or strongroom) is a secure space where money, valuables, records, and documents can be stored.
New!!: Access control and Bank vault ·
Barbed tape or razor wire is a mesh of metal strips with sharp edges whose purpose is to prevent passage by humans.
New!!: Access control and Barbed tape ·
Biometrics refers to metrics related to human characteristics.
New!!: Access control and Biometrics ·
Bioscrypt Inc. a biometrics research, development and manufacturing company.
New!!: Access control and Bioscrypt Inc. ·
Bluetooth low energy (Bluetooth LE, BLE, marketed as Bluetooth Smart) is a wireless personal area network technology designed and marketed by the Bluetooth Special Interest Group aimed at novel applications in the healthcare, fitness, beacons, security, and home entertainment industries.
A border guard of a country is a national security agency that performs border control, i.e., enforces the security of the country's national borders.
New!!: Access control and Border guard ·
A bouncer (also known as a doorman, door supervisor or cooler) is a type of security guard, employed at venues such as bars, nightclubs, ranches or concerts to provide security, check legal age, to refuse entry for intoxication, aggressive behavior or non-compliance with statutory or establishment rules.
New!!: Access control and Bouncer (doorman) ·
Capability-based security is a concept in the design of secure computing systems, one of the existing security models.
A card reader is a data input device that reads data from a card-shaped storage medium.
New!!: Access control and Card reader ·
A castle (from castellum) is a type of fortified structure built in Europe and the Middle East during the Middle Ages by nobility.
New!!: Access control and Castle ·
The Common Access Card, also colloquially referred to as the CAC (often called CAC card, due to what is informally known as RAS syndrome), is a smart card about the size of a credit card.
Computer security, also known as cybersecurity or IT security, is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide.
New!!: Access control and Computer security ·
A contactless smart card is a contactless 13.56-MHz credential whose dimensions are credit-card size.
A credential is an attestation of qualification, competence, or authority issued to an individual by a third party with a relevant or de facto authority or assumed competence to do so.
New!!: Access control and Credential ·
In electrical signalling an analog current loop is used where a device must be monitored or controlled remotely over a pair of conductors.
New!!: Access control and Current loop ·
Data is a set of values of qualitative or quantitative variables; restated, pieces of data are individual pieces of information.
New!!: Access control and Data ·
A data storage device is a device for recording (storing) information (data).
In computer security, discretionary access control (DAC) is a type of access control defined by the Trusted Computer System Evaluation Criteria "as a means of restricting access to objects based on the identity of subjects and/or groups to which they belong.
A door is a moving structure used to block off, and allow access to, an entrance to or within an enclosed space, such as a building or vehicle.
New!!: Access control and Door ·
Door security relates to prevention of door-related burglaries.
New!!: Access control and Door security ·
An electronic lock (or electric lock) is a locking device which operates by means of electric current.
New!!: Access control and Electronic lock ·
Federal Standard 1037C, titled Telecommunications: Glossary of Telecommunication Terms, is a United States Federal Standard issued by the General Services Administration pursuant to the Federal Property and Administrative Services Act of 1949, as amended.
A fence is a structure that encloses an area, typically outdoors, and is usually constructed from posts that are connected by boards, wire, rails or netting.
New!!: Access control and Fence ·
Fingerprint recognition or fingerprint authentication refers to the automated method of verifying a match between two human fingerprints.
Fortifications are military constructions or buildings designed for the defense of territories in warfare, and also used to solidify rule in a region during peace time.
New!!: Access control and Fortification ·
An identity document (also called a piece of identification or ID, or colloquially as one's 'papers') is any document which may be used to verify aspects of a person's personal identity.
New!!: Access control and Identity document ·
In computing, identity management (IdM) describes the management of individual principals, their authentication, authorization, and privileges within or across system and enterprise boundaries with the goal of increasing security and productivity while decreasing cost, downtime and repetitive tasks.
Identity-based security is a patented network security approach, put forward by Cyberoam which includes security components that provides visibility and control over user activity in a particular network.
Information security, sometimes shortened to InfoSec, is the practice of defending information from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction.
The Internet Protocol (IP) is the principal communications protocol in the Internet protocol suite for relaying datagrams across network boundaries.
New!!: Access control and Internet Protocol ·
IP access controller is an electronic security device designed to identify users and control entry to or exit from protected areas.
IP reader is an electronic security device designed to identify users and control entry to or exit from protected areas.
New!!: Access control and IP reader ·
For automated management of conventional keys, see Key management system Key management is the management of cryptographic keys in a cryptosystem.
New!!: Access control and Key management ·
A keychain or key chain is a small chain, usually made from metal or plastic, that connects a small item to a keyring.
New!!: Access control and Keychain ·
A lock is a mechanical or electronic fastening device that is released by a physical object (such as a key, keycard, fingerprint, RFID card, security token etc.), by supplying secret information (such as a keycode or password), or by a combination thereof.
Lock bumping is a lock picking technique for opening a pin tumbler lock using a specially crafted bump key, rapping key or a 999 key.
New!!: Access control and Lock bumping ·
Lock picking is the craft of unlocking a lock by analyzing and manipulating the components of the lock device without the original key.
New!!: Access control and Lock picking ·
Logical Security consists of software safeguards for an organization’s systems, including user identification and password access, authenticating, access rights and authority levels.
New!!: Access control and Logical security ·
In computer security, a login or logon or sign in or sign on refers to the credentials required to obtain access to a computer system or other restricted area.
New!!: Access control and Login ·
A magnetic stripe card is a type of card capable of storing data by modifying the magnetism of tiny iron-based magnetic particles on a band of magnetic material on the card.
Malware, short for malicious software, is any software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems.
New!!: Access control and Malware ·
In computer security, mandatory access control (MAC) refers to a type of access control by which the operating system constrains the ability of a subject or initiator to access or generally perform some sort of operation on an object or target.
A mantrap, air lock, sally port or access control vestibule is a physical security access control system comprising a small space with two sets of interlocking doors, such that the first set of doors must close before the second set opens.
MIL-STD-188 is a series of U.S. military standards relating to telecommunications.
New!!: Access control and MIL-STD-188 ·
Multi-factor authentication (MFA) is a method of computer access control which a user can pass by successfully presenting several separate authentication stages.
Committee on National Security Systems Instruction No.
Near field communication (NFC) is the set of protocols that enable electronic devices to establish radio communication with each other by touching the devices together, or bringing them into proximity to a distance of typically 10cm or less.
The object-capability model is a computer security model.
OpenID is an open standard and decentralized protocol by the non-profit '''OpenID Foundation''' that allows users to be authenticated by certain co-operating sites (known as Relying Parties or RP) using a third party service.
New!!: Access control and OpenID ·
An optical turnstile is a physical security device designed to restrict or control access to a building or secure area.
New!!: Access control and Optical turnstile ·
In computer security, organization-based access control (OrBAC) is an access control model first presented in 2003.
A password is a word or string of characters used for user authentication to prove identity or access approval to gain access to a resource (example: an access code is a type of password), which should be kept secret from those not allowed access.
New!!: Access control and Password ·
Photo identification is generally used to define any form of identity document that includes a photograph of the holder particularly his or her face.
Physical security describes security measures that are designed to deny unauthorized access to facilities, equipment and resources, and to protect personnel and property from damage or harm (such as espionage, theft, or terrorist attacks).
New!!: Access control and Physical security ·
Physical Security Information Management (PSIM) is a category of software that provides a platform and applications created by middleware developers, designed to integrate multiple unconnected security applications and devices and control them through one comprehensive user interface.
A Physical Security Professional (PSP) is a certification process for individuals involved in the physical security of organizations.
A policy is a deliberate system of principles to guide decisions and achieve rational outcomes.
New!!: Access control and Policy ·
In information security, computer science, and other fields, the principle of least privilege (also known as the principle of minimal privilege or the principle of least authority) requires that in a particular abstraction layer of a computing environment, every module (such as a process, a user, or a program, depending on the subject) must be able to access only the information and resources that are necessary for its legitimate purpose.
A prison, correctional facility, penitentiary, gaol (Ireland, England, Scotland, Wales), or jail is a facility in which inmates are forcibly confined and denied a variety of freedoms under the authority of the state as a form of punishment.
New!!: Access control and Prison ·
Proof-of-payment (POP) is an honor-based fare collection approach used on many public transportation systems.
New!!: Access control and Proof-of-payment ·
A proximity card or prox card is a "contactless" smart card which can be read without inserting it into a reader device, as required by earlier magnetic stripe cards such as credit cards and "contact" type smart cards.
New!!: Access control and Proximity card ·
A resource is a source or supply from which benefit is produced.
New!!: Access control and Resource ·
In computer systems security, role-based access control (RBAC) is an approach to restricting system access to authorized users.
TIA-485-A, also known as ANSI/TIA/EIA-485, TIA/EIA-485, EIA-485 or RS-485, is a standard defining the electrical characteristics of drivers and receivers for use in balanced digital multipoint systems. The standard is published by the Telecommunications Industry Association/Electronic Industries Alliance (TIA/EIA). Digital communications networks implementing the EIA-485 standard can be used effectively over long distances and in electrically noisy environments. Multiple receivers may be connected to such a network in a linear, multi-drop configuration. These characteristics make such networks useful in industrial environments and similar applications. The EIA once labeled all its standards with the prefix "RS" (Recommended Standard), but the EIA-TIA officially replaced "RS" with "EIA/TIA" to help identify the origin of its standards. The EIA has officially disbanded and the standard is now maintained by the TIA. The RS-485 standard is superseded by TIA-485, but often engineers and applications guides continue to use the RS designation.
New!!: Access control and RS-485 ·
A safe (also called a strongbox or coffer) is a secure lockable box used for securing valuable objects against theft and/or damage from fire.
New!!: Access control and Safe ·
Safe-cracking is the process of opening a safe without either the combination or key.
New!!: Access control and Safe-cracking ·
Security is the degree of resistance to, or protection from, harm.
New!!: Access control and Security ·
A security alarm is a system designed to detect intrusion – unauthorized entry – into a building or area.
New!!: Access control and Security alarm ·
Security engineering is a specialized field of engineering that focuses on the security aspects in the design of systems that need to be able to deal robustly with possible sources of disruption, ranging from natural disasters to malicious acts.
In the field of physical security, security lighting is often used as a preventive and corrective measure against intrusions or other criminal activity on a physical piece of property.
New!!: Access control and Security lighting ·
Security management is the identification of an organization's assets (including information assets), followed by the development, documentation, and implementation of policies and procedures for protecting these assets.
Security policy is a definition of what it means to be secure for a system, organization or other entity.
New!!: Access control and Security policy ·
A server room is a room, usually air-conditioned, devoted to the continuous operation of computer servers.
New!!: Access control and Server room ·
Shon Harris (March 27, 1968 – October 8, 2014) was a prolific author of books and articles on topics related to information security, including study guides for (ISC)2's CISSP security certification examination.
New!!: Access control and Shon Harris ·
A smart card, chip card, or integrated circuit card (ICC) is any pocket-sized card with embedded integrated circuits.
New!!: Access control and Smart card ·
Social control is a concept within the disciplines of the social sciences and within political science.
New!!: Access control and Social control ·
A system is a set of interacting or interdependent component parts forming a complex/intricate whole.
New!!: Access control and System ·
Telecommunication occurs when the exchange of information between two or more entities (communication) includes the use of technology.
New!!: Access control and Telecommunication ·
A terminal server (also referred to as a serial server or console server network access server) enables organizations to connect devices with an RS-232, RS-422 or RS-485 serial interface to a local area network (LAN).
New!!: Access control and Terminal server ·
A ticket is a voucher that indicates that one has paid for admission to an event or establishment such as a theatre, amusement park or tourist attraction, or permission to travel on a vehicle (such as with an airline ticket, bus ticket or train ticket) typically because one has paid the fare.
In the security engineering subspecialty of computer science, a trusted system is a system that is relied upon to a specified extent to enforce a specified security policy.
New!!: Access control and Trusted system ·
A turnstile, also called a baffle gate, is a form of gate which allows one person to pass at a time.
New!!: Access control and Turnstile ·
Two-factor authentication (also known as 2FA) is a technology patented in 1984 that provides identification of users by means of the combination of two different components.
In telecommunications, a user is a person, organization, or other entity that employs the services provided by a telecommunication system, or by an information processing system, for transfer of information.
A vertical service code (VSC) is a special code dialed prior to (or instead of) a telephone number that engages some type of special telephone service or feature.
The Wiegand effect is a nonlinear magnetic effect, named after its discoverer John R. Wiegand, produced in specially annealed and hardened wire called Wiegand wire.
New!!: Access control and Wiegand effect ·
The Wiegand interface is a de facto wiring standard which arose from the popularity of Wiegand effect card readers in the 1980s.
New!!: Access control and Wiegand interface ·
XACML stands for "eXtensible Access Control Markup Language".
New!!: Access control and XACML ·
A.htaccess (hypertext access) file is a directory-level configuration file supported by several web servers, that allows for decentralized management of web server configuration.
New!!: Access control and .htaccess ·
Access Control, Access Control Systems, Access control protocol, Access control system, Access controls, Access policy, Attribute based access control, Authentication in web, Physical access control, Subject (access control).