Get it on Google Play
New! Download Unionpedia on your Android™ device!
Faster access than browser!
New! Discover your interests! » Create account

In the fields of physical security and information security, access control is the selective restriction of access to a place or other resource. [1]

100 relations: Access badge, Access control list, Access Control Matrix, Accountability, Alarm device, Alarm management, Attribute-based access control, Audit trail, Authentication, Authorization (computer access control), Automated information system, Bank vault, Barbed tape, Biometrics, Bioscrypt Inc., Bluetooth low energy, Border guard, Bouncer (doorman), Capability-based security, Card reader, Castle, Common Access Card, Computer security, Contactless smart card, Credential, Current loop, Data, Data storage device, Discretionary access control, Door, Door security, Electronic lock, Federal Standard 1037C, Fence, Fingerprint recognition, Fortification, Identity document, Identity management, Identity-based security, Information security, Internet Protocol, IP access controller, IP reader, Key management, Keychain, Lock (security device), Lock bumping, Lock picking, Logical security, Login, ..., Magnetic stripe card, Malware, Mandatory access control, Mantrap (access control), MIL-STD-188, Multi-factor authentication, National Information Assurance Glossary, Near field communication, Object-capability model, OpenID, Optical turnstile, Organisation-based access control, Password, Photo identification, Physical security, Physical security information management, Physical Security Professional, Policy, Principle of least privilege, Prison, Proof-of-payment, Proximity card, Resource, Role-based access control, RS-485, Safe, Safe-cracking, Security, Security alarm, Security engineering, Security lighting, Security management, Security policy, Server room, Shon Harris, Smart card, Social control, System, Telecommunication, Terminal server, Ticket (admission), Trusted system, Turnstile, Two-factor authentication, User (telecommunications), Vertical service code, Wiegand effect, Wiegand interface, XACML, .htaccess. Expand index (50 more) »

Access badge

An access badge is a credential used to gain entry to an area having automated access control entry points.

New!!: Access control and Access badge · See more »

Access control list

An access control list (ACL), with respect to a computer file system, is a list of permissions attached to an object.

New!!: Access control and Access control list · See more »

Access Control Matrix

In computer science, an Access Control Matrix or Access Matrix is an abstract, formal security model of protection state in computer systems, that characterizes the rights of each subject with respect to every object in the system.

New!!: Access control and Access Control Matrix · See more »


In ethics and governance, accountability is answerability, blameworthiness, liability, and the expectation of account-giving.

New!!: Access control and Accountability · See more »

Alarm device

An alarm device or system of alarm devices gives an audible, visual or other form of alarm signal about a problem or condition.

New!!: Access control and Alarm device · See more »

Alarm management

Alarm management is the application of human factors (or 'ergonomics') along with instrumentation engineering and systems thinking to manage the design of an alarm system to increase its usability.

New!!: Access control and Alarm management · See more »

Attribute-based access control

Attribute-based access control (ABAC) defines an access control paradigm whereby access rights are granted to users through the use of policies which combine attributes together.

New!!: Access control and Attribute-based access control · See more »

Audit trail

An audit trail (also called audit log) is a security-relevant chronological record, set of records, and/or destination and source of records that provide documentary evidence of the sequence of activities that have affected at any time a specific operation, procedure, or event.

New!!: Access control and Audit trail · See more »


Authentication (from authentikos, "real, genuine," from αὐθέντης authentes, "author") is the act of confirming the truth of an attribute of a single piece of data (a datum) claimed true by an entity.

New!!: Access control and Authentication · See more »

Authorization (computer access control)

Authorization or authorisation is the function of specifying access rights to resources related to information security and computer security in general and to access control in particular.

New!!: Access control and Authorization (computer access control) · See more »

Automated information system

An automated information system (AIS) is an assembly of computer hardware, software, firmware, or any combination of these, configured to accomplish specific information-handling operations, such as communication, computation, dissemination, processing, and storage of information.

New!!: Access control and Automated information system · See more »

Bank vault

A bank vault (or strongroom) is a secure space where money, valuables, records, and documents can be stored.

New!!: Access control and Bank vault · See more »

Barbed tape

Barbed tape or razor wire is a mesh of metal strips with sharp edges whose purpose is to prevent passage by humans.

New!!: Access control and Barbed tape · See more »


Biometrics refers to metrics related to human characteristics.

New!!: Access control and Biometrics · See more »

Bioscrypt Inc.

Bioscrypt Inc. a biometrics research, development and manufacturing company.

New!!: Access control and Bioscrypt Inc. · See more »

Bluetooth low energy

Bluetooth low energy (Bluetooth LE, BLE, marketed as Bluetooth Smart) is a wireless personal area network technology designed and marketed by the Bluetooth Special Interest Group aimed at novel applications in the healthcare, fitness, beacons, security, and home entertainment industries.

New!!: Access control and Bluetooth low energy · See more »

Border guard

A border guard of a country is a national security agency that performs border control, i.e., enforces the security of the country's national borders.

New!!: Access control and Border guard · See more »

Bouncer (doorman)

A bouncer (also known as a doorman, door supervisor or cooler) is a type of security guard, employed at venues such as bars, nightclubs, ranches or concerts to provide security, check legal age, to refuse entry for intoxication, aggressive behavior or non-compliance with statutory or establishment rules.

New!!: Access control and Bouncer (doorman) · See more »

Capability-based security

Capability-based security is a concept in the design of secure computing systems, one of the existing security models.

New!!: Access control and Capability-based security · See more »

Card reader

A card reader is a data input device that reads data from a card-shaped storage medium.

New!!: Access control and Card reader · See more »


A castle (from castellum) is a type of fortified structure built in Europe and the Middle East during the Middle Ages by nobility.

New!!: Access control and Castle · See more »

Common Access Card

The Common Access Card, also colloquially referred to as the CAC (often called CAC card, due to what is informally known as RAS syndrome), is a smart card about the size of a credit card.

New!!: Access control and Common Access Card · See more »

Computer security

Computer security, also known as cybersecurity or IT security, is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide.

New!!: Access control and Computer security · See more »

Contactless smart card

A contactless smart card is a contactless 13.56-MHz credential whose dimensions are credit-card size.

New!!: Access control and Contactless smart card · See more »


A credential is an attestation of qualification, competence, or authority issued to an individual by a third party with a relevant or de facto authority or assumed competence to do so.

New!!: Access control and Credential · See more »

Current loop

In electrical signalling an analog current loop is used where a device must be monitored or controlled remotely over a pair of conductors.

New!!: Access control and Current loop · See more »


Data is a set of values of qualitative or quantitative variables; restated, pieces of data are individual pieces of information.

New!!: Access control and Data · See more »

Data storage device

A data storage device is a device for recording (storing) information (data).

New!!: Access control and Data storage device · See more »

Discretionary access control

In computer security, discretionary access control (DAC) is a type of access control defined by the Trusted Computer System Evaluation Criteria "as a means of restricting access to objects based on the identity of subjects and/or groups to which they belong.

New!!: Access control and Discretionary access control · See more »


A door is a moving structure used to block off, and allow access to, an entrance to or within an enclosed space, such as a building or vehicle.

New!!: Access control and Door · See more »

Door security

Door security relates to prevention of door-related burglaries.

New!!: Access control and Door security · See more »

Electronic lock

An electronic lock (or electric lock) is a locking device which operates by means of electric current.

New!!: Access control and Electronic lock · See more »

Federal Standard 1037C

Federal Standard 1037C, titled Telecommunications: Glossary of Telecommunication Terms, is a United States Federal Standard issued by the General Services Administration pursuant to the Federal Property and Administrative Services Act of 1949, as amended.

New!!: Access control and Federal Standard 1037C · See more »


A fence is a structure that encloses an area, typically outdoors, and is usually constructed from posts that are connected by boards, wire, rails or netting.

New!!: Access control and Fence · See more »

Fingerprint recognition

Fingerprint recognition or fingerprint authentication refers to the automated method of verifying a match between two human fingerprints.

New!!: Access control and Fingerprint recognition · See more »


Fortifications are military constructions or buildings designed for the defense of territories in warfare, and also used to solidify rule in a region during peace time.

New!!: Access control and Fortification · See more »

Identity document

An identity document (also called a piece of identification or ID, or colloquially as one's 'papers') is any document which may be used to verify aspects of a person's personal identity.

New!!: Access control and Identity document · See more »

Identity management

In computing, identity management (IdM) describes the management of individual principals, their authentication, authorization, and privileges within or across system and enterprise boundaries with the goal of increasing security and productivity while decreasing cost, downtime and repetitive tasks.

New!!: Access control and Identity management · See more »

Identity-based security

Identity-based security is a patented network security approach, put forward by Cyberoam which includes security components that provides visibility and control over user activity in a particular network.

New!!: Access control and Identity-based security · See more »

Information security

Information security, sometimes shortened to InfoSec, is the practice of defending information from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction.

New!!: Access control and Information security · See more »

Internet Protocol

The Internet Protocol (IP) is the principal communications protocol in the Internet protocol suite for relaying datagrams across network boundaries.

New!!: Access control and Internet Protocol · See more »

IP access controller

IP access controller is an electronic security device designed to identify users and control entry to or exit from protected areas.

New!!: Access control and IP access controller · See more »

IP reader

IP reader is an electronic security device designed to identify users and control entry to or exit from protected areas.

New!!: Access control and IP reader · See more »

Key management

For automated management of conventional keys, see Key management system Key management is the management of cryptographic keys in a cryptosystem.

New!!: Access control and Key management · See more »


A keychain or key chain is a small chain, usually made from metal or plastic, that connects a small item to a keyring.

New!!: Access control and Keychain · See more »

Lock (security device)

A lock is a mechanical or electronic fastening device that is released by a physical object (such as a key, keycard, fingerprint, RFID card, security token etc.), by supplying secret information (such as a keycode or password), or by a combination thereof.

New!!: Access control and Lock (security device) · See more »

Lock bumping

Lock bumping is a lock picking technique for opening a pin tumbler lock using a specially crafted bump key, rapping key or a 999 key.

New!!: Access control and Lock bumping · See more »

Lock picking

Lock picking is the craft of unlocking a lock by analyzing and manipulating the components of the lock device without the original key.

New!!: Access control and Lock picking · See more »

Logical security

Logical Security consists of software safeguards for an organization’s systems, including user identification and password access, authenticating, access rights and authority levels.

New!!: Access control and Logical security · See more »


In computer security, a login or logon or sign in or sign on refers to the credentials required to obtain access to a computer system or other restricted area.

New!!: Access control and Login · See more »

Magnetic stripe card

A magnetic stripe card is a type of card capable of storing data by modifying the magnetism of tiny iron-based magnetic particles on a band of magnetic material on the card.

New!!: Access control and Magnetic stripe card · See more »


Malware, short for malicious software, is any software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems.

New!!: Access control and Malware · See more »

Mandatory access control

In computer security, mandatory access control (MAC) refers to a type of access control by which the operating system constrains the ability of a subject or initiator to access or generally perform some sort of operation on an object or target.

New!!: Access control and Mandatory access control · See more »

Mantrap (access control)

A mantrap, air lock, sally port or access control vestibule is a physical security access control system comprising a small space with two sets of interlocking doors, such that the first set of doors must close before the second set opens.

New!!: Access control and Mantrap (access control) · See more »


MIL-STD-188 is a series of U.S. military standards relating to telecommunications.

New!!: Access control and MIL-STD-188 · See more »

Multi-factor authentication

Multi-factor authentication (MFA) is a method of computer access control which a user can pass by successfully presenting several separate authentication stages.

New!!: Access control and Multi-factor authentication · See more »

National Information Assurance Glossary

Committee on National Security Systems Instruction No.

New!!: Access control and National Information Assurance Glossary · See more »

Near field communication

Near field communication (NFC) is the set of protocols that enable electronic devices to establish radio communication with each other by touching the devices together, or bringing them into proximity to a distance of typically 10cm or less.

New!!: Access control and Near field communication · See more »

Object-capability model

The object-capability model is a computer security model.

New!!: Access control and Object-capability model · See more »


OpenID is an open standard and decentralized protocol by the non-profit '''OpenID Foundation''' that allows users to be authenticated by certain co-operating sites (known as Relying Parties or RP) using a third party service.

New!!: Access control and OpenID · See more »

Optical turnstile

An optical turnstile is a physical security device designed to restrict or control access to a building or secure area.

New!!: Access control and Optical turnstile · See more »

Organisation-based access control

In computer security, organization-based access control (OrBAC) is an access control model first presented in 2003.

New!!: Access control and Organisation-based access control · See more »


A password is a word or string of characters used for user authentication to prove identity or access approval to gain access to a resource (example: an access code is a type of password), which should be kept secret from those not allowed access.

New!!: Access control and Password · See more »

Photo identification

Photo identification is generally used to define any form of identity document that includes a photograph of the holder particularly his or her face.

New!!: Access control and Photo identification · See more »

Physical security

Physical security describes security measures that are designed to deny unauthorized access to facilities, equipment and resources, and to protect personnel and property from damage or harm (such as espionage, theft, or terrorist attacks).

New!!: Access control and Physical security · See more »

Physical security information management

Physical Security Information Management (PSIM) is a category of software that provides a platform and applications created by middleware developers, designed to integrate multiple unconnected security applications and devices and control them through one comprehensive user interface.

New!!: Access control and Physical security information management · See more »

Physical Security Professional

A Physical Security Professional (PSP) is a certification process for individuals involved in the physical security of organizations.

New!!: Access control and Physical Security Professional · See more »


A policy is a deliberate system of principles to guide decisions and achieve rational outcomes.

New!!: Access control and Policy · See more »

Principle of least privilege

In information security, computer science, and other fields, the principle of least privilege (also known as the principle of minimal privilege or the principle of least authority) requires that in a particular abstraction layer of a computing environment, every module (such as a process, a user, or a program, depending on the subject) must be able to access only the information and resources that are necessary for its legitimate purpose.

New!!: Access control and Principle of least privilege · See more »


A prison, correctional facility, penitentiary, gaol (Ireland, England, Scotland, Wales), or jail is a facility in which inmates are forcibly confined and denied a variety of freedoms under the authority of the state as a form of punishment.

New!!: Access control and Prison · See more »


Proof-of-payment (POP) is an honor-based fare collection approach used on many public transportation systems.

New!!: Access control and Proof-of-payment · See more »

Proximity card

A proximity card or prox card is a "contactless" smart card which can be read without inserting it into a reader device, as required by earlier magnetic stripe cards such as credit cards and "contact" type smart cards.

New!!: Access control and Proximity card · See more »


A resource is a source or supply from which benefit is produced.

New!!: Access control and Resource · See more »

Role-based access control

In computer systems security, role-based access control (RBAC) is an approach to restricting system access to authorized users.

New!!: Access control and Role-based access control · See more »


TIA-485-A, also known as ANSI/TIA/EIA-485, TIA/EIA-485, EIA-485 or RS-485, is a standard defining the electrical characteristics of drivers and receivers for use in balanced digital multipoint systems. The standard is published by the Telecommunications Industry Association/Electronic Industries Alliance (TIA/EIA). Digital communications networks implementing the EIA-485 standard can be used effectively over long distances and in electrically noisy environments. Multiple receivers may be connected to such a network in a linear, multi-drop configuration. These characteristics make such networks useful in industrial environments and similar applications. The EIA once labeled all its standards with the prefix "RS" (Recommended Standard), but the EIA-TIA officially replaced "RS" with "EIA/TIA" to help identify the origin of its standards. The EIA has officially disbanded and the standard is now maintained by the TIA. The RS-485 standard is superseded by TIA-485, but often engineers and applications guides continue to use the RS designation.

New!!: Access control and RS-485 · See more »


A safe (also called a strongbox or coffer) is a secure lockable box used for securing valuable objects against theft and/or damage from fire.

New!!: Access control and Safe · See more »


Safe-cracking is the process of opening a safe without either the combination or key.

New!!: Access control and Safe-cracking · See more »


Security is the degree of resistance to, or protection from, harm.

New!!: Access control and Security · See more »

Security alarm

A security alarm is a system designed to detect intrusion – unauthorized entry – into a building or area.

New!!: Access control and Security alarm · See more »

Security engineering

Security engineering is a specialized field of engineering that focuses on the security aspects in the design of systems that need to be able to deal robustly with possible sources of disruption, ranging from natural disasters to malicious acts.

New!!: Access control and Security engineering · See more »

Security lighting

In the field of physical security, security lighting is often used as a preventive and corrective measure against intrusions or other criminal activity on a physical piece of property.

New!!: Access control and Security lighting · See more »

Security management

Security management is the identification of an organization's assets (including information assets), followed by the development, documentation, and implementation of policies and procedures for protecting these assets.

New!!: Access control and Security management · See more »

Security policy

Security policy is a definition of what it means to be secure for a system, organization or other entity.

New!!: Access control and Security policy · See more »

Server room

A server room is a room, usually air-conditioned, devoted to the continuous operation of computer servers.

New!!: Access control and Server room · See more »

Shon Harris

Shon Harris (March 27, 1968 – October 8, 2014) was a prolific author of books and articles on topics related to information security, including study guides for (ISC)2's CISSP security certification examination.

New!!: Access control and Shon Harris · See more »

Smart card

A smart card, chip card, or integrated circuit card (ICC) is any pocket-sized card with embedded integrated circuits.

New!!: Access control and Smart card · See more »

Social control

Social control is a concept within the disciplines of the social sciences and within political science.

New!!: Access control and Social control · See more »


A system is a set of interacting or interdependent component parts forming a complex/intricate whole.

New!!: Access control and System · See more »


Telecommunication occurs when the exchange of information between two or more entities (communication) includes the use of technology.

New!!: Access control and Telecommunication · See more »

Terminal server

A terminal server (also referred to as a serial server or console server network access server) enables organizations to connect devices with an RS-232, RS-422 or RS-485 serial interface to a local area network (LAN).

New!!: Access control and Terminal server · See more »

Ticket (admission)

A ticket is a voucher that indicates that one has paid for admission to an event or establishment such as a theatre, amusement park or tourist attraction, or permission to travel on a vehicle (such as with an airline ticket, bus ticket or train ticket) typically because one has paid the fare.

New!!: Access control and Ticket (admission) · See more »

Trusted system

In the security engineering subspecialty of computer science, a trusted system is a system that is relied upon to a specified extent to enforce a specified security policy.

New!!: Access control and Trusted system · See more »


A turnstile, also called a baffle gate, is a form of gate which allows one person to pass at a time.

New!!: Access control and Turnstile · See more »

Two-factor authentication

Two-factor authentication (also known as 2FA) is a technology patented in 1984 that provides identification of users by means of the combination of two different components.

New!!: Access control and Two-factor authentication · See more »

User (telecommunications)

In telecommunications, a user is a person, organization, or other entity that employs the services provided by a telecommunication system, or by an information processing system, for transfer of information.

New!!: Access control and User (telecommunications) · See more »

Vertical service code

A vertical service code (VSC) is a special code dialed prior to (or instead of) a telephone number that engages some type of special telephone service or feature.

New!!: Access control and Vertical service code · See more »

Wiegand effect

The Wiegand effect is a nonlinear magnetic effect, named after its discoverer John R. Wiegand, produced in specially annealed and hardened wire called Wiegand wire.

New!!: Access control and Wiegand effect · See more »

Wiegand interface

The Wiegand interface is a de facto wiring standard which arose from the popularity of Wiegand effect card readers in the 1980s.

New!!: Access control and Wiegand interface · See more »


XACML stands for "eXtensible Access Control Markup Language".

New!!: Access control and XACML · See more »


A.htaccess (hypertext access) file is a directory-level configuration file supported by several web servers, that allows for decentralized management of web server configuration.

New!!: Access control and .htaccess · See more »

Redirects here:

Access Control, Access Control Systems, Access control protocol, Access control system, Access controls, Access policy, Attribute based access control, Authentication in web, Physical access control, Subject (access control).


[1] https://en.wikipedia.org/wiki/Access_control

Hey! We are on Facebook now! »