Logo
Unionpedia
Communication
Get it on Google Play
New! Download Unionpedia on your Android™ device!
Free
Faster access than browser!
 

Access control

+ Save concept

In the fields of physical security and information security, access control (AC) is the selective restriction of access to a place or other resource. [1]

111 relations: Access badge, Access control list, Access Control Matrix, Access modifiers, Accountability, Alarm device, Alarm management, Attribute-based access control, Audit trail, Authentication, Authorization, Automated information system, Bank vault, Barbed tape, Biometrics, Bluetooth Low Energy, Border guard, Bouncer (doorman), Capability-based security, Card reader, Castle, Common Access Card, Computer security, Contactless smart card, Coupling, Credential, Current loop, Data, Data storage, Database, Database transaction, Discretionary access control, Door, Door security, Electronic lock, Encapsulation (computer programming), Federal Standard 1037C, Fence, Fingerprint, Fortification, Identity document, Identity management, Identity-based security, Information hiding, Information security, Internet Protocol, IP access controller, IP reader, Key management, Keychain, ..., Light-emitting diode, Lock (security device), Lock bumping, Lock picking, Lock screen, Logical security, Login, Magnetic stripe card, Malware, Mandatory access control, Mantrap (access control), MIL-STD-188, Multi-factor authentication, Mutator method, National Incident Management System, National Information Assurance Glossary, Near-field communication, Object-capability model, Object-oriented programming, OpenID, Optical turnstile, Organisation-based access control, Password, Photo identification, Physical security, Physical security information management, Physical Security Professional, Piggybacking (security), Policy, Principle of least privilege, Prison, Proof-of-payment, Proximity card, Resource, Role-based access control, RS-485, Safe, Safe-cracking, Sally port, Security, Security alarm, Security engineering, Security lighting, Security management, Security policy, Server room, Shon Harris, Smart card, Social control, System, Telecommunication, Terminal server, Ticket (admission), Trusted system, Turnstile, User (telecommunications), Vertical service code, Wiegand effect, Wiegand interface, XACML, .htaccess. Expand index (61 more) »

Access badge

An access badge is a credential used to gain entry to an area having automated access control entry points.

New!!: Access control and Access badge · See more »

Access control list

An access control list (ACL), with respect to a computer file system, is a list of permissions attached to an object.

New!!: Access control and Access control list · See more »

Access Control Matrix

In computer science, an Access Control Matrix or Access Matrix is an abstract, formal security model of protection state in computer systems, that characterizes the rights of each subject with respect to every object in the system.

New!!: Access control and Access Control Matrix · See more »

Access modifiers

Access modifiers (or access specifiers) are keywords in object-oriented languages that set the accessibility of classes, methods, and other members.

New!!: Access control and Access modifiers · See more »

Accountability

In ethics and governance, accountability is answerability, blameworthiness, liability, and the expectation of account-giving.

New!!: Access control and Accountability · See more »

Alarm device

An alarm device or system of alarm devices gives an audible, visual or other form of alarm signal about a problem or condition.

New!!: Access control and Alarm device · See more »

Alarm management

Alarm management is the application of human factors (or 'ergonomics') along with instrumentation engineering and systems thinking to manage the design of an alarm system to increase its usability.

New!!: Access control and Alarm management · See more »

Attribute-based access control

Attribute-based access control (ABAC) defines an access control paradigm whereby access rights are granted to users through the use of policies which combine attributes together.

New!!: Access control and Attribute-based access control · See more »

Audit trail

An audit trail (also called audit log) is a security-relevant chronological record, set of records, and/or destination and source of records that provide documentary evidence of the sequence of activities that have affected at any time a specific operation, procedure, or event.

New!!: Access control and Audit trail · See more »

Authentication

Authentication (from authentikos, "real, genuine", from αὐθέντης authentes, "author") is the act of confirming the truth of an attribute of a single piece of data claimed true by an entity.

New!!: Access control and Authentication · See more »

Authorization

Authorization is the function of specifying access rights/privileges to resources related to information security and computer security in general and to access control in particular.

New!!: Access control and Authorization · See more »

Automated information system

An automated information system (AIS) is an assembly of computer hardware, software, firmware, or any combination of these, configured to accomplish specific information-handling operations, such as communication, computation, dissemination, processing, and storage of information.

New!!: Access control and Automated information system · See more »

Bank vault

A bank vault is a secure space where money, valuables, records, and documents are stored.

New!!: Access control and Bank vault · See more »

Barbed tape

Barbed tape or razor wire is a mesh of metal strips with sharp edges whose purpose is to prevent passage by humans.

New!!: Access control and Barbed tape · See more »

Biometrics

Biometrics is the technical term for body measurements and calculations.

New!!: Access control and Biometrics · See more »

Bluetooth Low Energy

Bluetooth Low Energy (Bluetooth LE, colloquially BLE, formerly marketed as Bluetooth Smart) is a wireless personal area network technology designed and marketed by the Bluetooth Special Interest Group (Bluetooth SIG) aimed at novel applications in the healthcare, fitness, beacons, security, and home entertainment industries.

New!!: Access control and Bluetooth Low Energy · See more »

Border guard

A border guard of a country is a national security agency that performs border control, i.e., enforces the security of the country's national borders.

New!!: Access control and Border guard · See more »

Bouncer (doorman)

A bouncer (also known as a doorman, door supervisor or cooler) is a type of security guard, employed at venues such as bars, nightclubs, stripclubs, casinos, restaurants or concerts.

New!!: Access control and Bouncer (doorman) · See more »

Capability-based security

Capability-based security is a concept in the design of secure computing systems, one of the existing security models.

New!!: Access control and Capability-based security · See more »

Card reader

A card reader is a data input device that reads data from a card-shaped storage medium.

New!!: Access control and Card reader · See more »

Castle

A castle (from castellum) is a type of fortified structure built during the Middle Ages by predominantly the nobility or royalty and by military orders.

New!!: Access control and Castle · See more »

Christmas

Christmas is an annual festival commemorating the birth of Jesus Christ,Martindale, Cyril Charles.

New!!: Access control and Christmas · See more »

Christmas and holiday season

The Christmas season, also called the festive season, or the holiday season (mainly in the U.S. and Canada; often simply called the holidays),, is an annually recurring period recognized in many Western and Western-influenced countries that is generally considered to run from late November to early January.

New!!: Access control and Christmas and holiday season · See more »

Christmas Eve

Christmas Eve is the evening or entire day before Christmas Day, the festival commemorating the birth of Jesus.

New!!: Access control and Christmas Eve · See more »

Christmas traditions

Christmas traditions vary from country to country.

New!!: Access control and Christmas traditions · See more »

Common Access Card

The Common Access Card, also commonly referred to as the CAC or CAC card, is a smart card about the size of a credit card.

New!!: Access control and Common Access Card · See more »

Computer security

Cybersecurity, computer security or IT security is the protection of computer systems from theft of or damage to their hardware, software or electronic data, as well as from disruption or misdirection of the services they provide.

New!!: Access control and Computer security · See more »

Contactless smart card

A contactless smart card is a contactless credential whose dimensions are credit-card size.

New!!: Access control and Contactless smart card · See more »

Coupling

A coupling is a device used to connect two shafts together at their ends for the purpose of transmitting power.

New!!: Access control and Coupling · See more »

Credential

Examples of credentials include academic diplomas, academic degrees, certifications, security clearances, identification documents, badges, passwords, user names, keys, powers of attorney, and so on.

New!!: Access control and Credential · See more »

Current loop

In electrical signalling an analog current loop is used where a device must be monitored or controlled remotely over a pair of conductors.

New!!: Access control and Current loop · See more »

Data

Data is a set of values of qualitative or quantitative variables.

New!!: Access control and Data · See more »

Data storage

Data storage is the recording (storing) of information (data) in a storage medium.

New!!: Access control and Data storage · See more »

Database

A database is an organized collection of data, stored and accessed electronically.

New!!: Access control and Database · See more »

Database transaction

A transaction symbolizes a unit of work performed within a database management system (or similar system) against a database, and treated in a coherent and reliable way independent of other transactions.

New!!: Access control and Database transaction · See more »

Discretionary access control

In computer security, discretionary access control (DAC) is a type of access control defined by the Trusted Computer System Evaluation Criteria "as a means of restricting access to objects based on the identity of subjects and/or groups to which they belong.

New!!: Access control and Discretionary access control · See more »

Door

A door is a moving mechanism used to block off and allow access to, an entrance to or within an enclosed space, such as a building, room or vehicle.

New!!: Access control and Door · See more »

Door security

The term door security may refer to any of a range of measures used to strengthen doors against door breaching, Ram-raiding and lock picking, and prevent crimes such as burglary and home invasions.

New!!: Access control and Door security · See more »

Electronic lock

An electronic lock (or electric lock) is a locking device which operates by means of electric current.

New!!: Access control and Electronic lock · See more »

Encapsulation (computer programming)

In object oriented programming languages, encapsulation is used to refer to one of two related but distinct notions, and sometimes to the combination thereof.

New!!: Access control and Encapsulation (computer programming) · See more »

Federal Standard 1037C

Federal Standard 1037C, titled Telecommunications: Glossary of Telecommunication Terms, is a United States Federal Standard issued by the General Services Administration pursuant to the Federal Property and Administrative Services Act of 1949, as amended.

New!!: Access control and Federal Standard 1037C · See more »

Fence

A fence is a structure that encloses an area, typically outdoors, and is usually constructed from posts that are connected by boards, wire, rails or netting.

New!!: Access control and Fence · See more »

Fingerprint

A fingerprint in its narrow sense is an impression left by the friction ridges of a human finger.

New!!: Access control and Fingerprint · See more »

Fortification

A fortification is a military construction or building designed for the defense of territories in warfare; and is also used to solidify rule in a region during peacetime.

New!!: Access control and Fortification · See more »

Identity document

An identity document (also called a piece of identification or ID, or colloquially as papers) is any document which may be used to prove a person's identity.

New!!: Access control and Identity document · See more »

Identity management

Identity management, also known as identity and access management (IAM) is, in computer security, the security and business discipline that "enables the right individuals to access the right resources at the right times and for the right reasons".

New!!: Access control and Identity management · See more »

Identity-based security

Identity-based security is an approach to control access to a digital product or service based on the authenticated identity of an individual.

New!!: Access control and Identity-based security · See more »

Information hiding

In computer science, information hiding is the principle of segregation of the design decisions in a computer program that are most likely to change, thus protecting other parts of the program from extensive modification if the design decision is changed.

New!!: Access control and Information hiding · See more »

Information security

Information security, sometimes shortened to InfoSec, is the practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction of information.

New!!: Access control and Information security · See more »

Internet Protocol

The Internet Protocol (IP) is the principal communications protocol in the Internet protocol suite for relaying datagrams across network boundaries.

New!!: Access control and Internet Protocol · See more »

IP access controller

IP access controller is an electronic security device designed to identify users and control entry to or exit from protected areas.

New!!: Access control and IP access controller · See more »

IP reader

IP reader is an electronic security device designed to identify users and control entry to or exit from protected areas.

New!!: Access control and IP reader · See more »

Key management

Key management refers to management of cryptographic keys in a cryptosystem.

New!!: Access control and Key management · See more »

Keychain

A keychain, or keyring, is a small chain, usually made from metal or plastic, that connects a small item to a keyring.

New!!: Access control and Keychain · See more »

Light-emitting diode

A light-emitting diode (LED) is a two-lead semiconductor light source.

New!!: Access control and Light-emitting diode · See more »

Lock (security device)

A lock is a mechanical or electronic fastening device that is released by a physical object (such as a key, keycard, fingerprint, RFID card, security token, coin etc.), by supplying secret information (such as a keycode or password), or by a combination thereof.

New!!: Access control and Lock (security device) · See more »

Lock bumping

Lock bumping is a lock picking technique for opening a pin tumbler lock using a specially crafted bump key, rapping key or a 999 key.

New!!: Access control and Lock bumping · See more »

Lock picking

Although lock picking can be associated with criminal intent, it is an essential skill for the legitimate profession of locksmithing, and is also pursued by law-abiding citizens as a useful skill to learn, or simply as a hobby (locksport).

New!!: Access control and Lock picking · See more »

Lock screen

A lock screen is a computer user interface element used by various operating systems.

New!!: Access control and Lock screen · See more »

Logical security

Logical Security consists of software safeguards for an organization’s systems, including user identification and password access, authenticating, access rights and authority levels.

New!!: Access control and Logical security · See more »

Login

In computer security, logging in (or logging on or signing in or signing on) is the process by which an individual gains access to a computer system by identifying and authenticating themselves.

New!!: Access control and Login · See more »

Magnetic stripe card

A magnetic stripe card is a type of card capable of storing data by modifying the magnetism of tiny iron-based magnetic particles on a band of magnetic material on the card.

New!!: Access control and Magnetic stripe card · See more »

Malware

Malware (a portmanteau for malicious software) is any software intentionally designed to cause damage to a computer, server or computer network.

New!!: Access control and Malware · See more »

Mandatory access control

In computer security, mandatory access control (MAC) refers to a type of access control by which the operating system constrains the ability of a subject or initiator to access or generally perform some sort of operation on an object or target.

New!!: Access control and Mandatory access control · See more »

Mantrap (access control)

A mantrap, air lock, sally port or access control vestibule is a physical security access control system comprising a small space with two sets of interlocking doors, such that the first set of doors must close before the second set opens.

New!!: Access control and Mantrap (access control) · See more »

MIL-STD-188

MIL-STD-188 is a series of U.S. military standards relating to telecommunications.

New!!: Access control and MIL-STD-188 · See more »

Multi-factor authentication

Multi-factor authentication (MFA) is a method of confirming a user's claimed identity in which a user is granted access only after successfully presenting 2 or more pieces of evidence (or factors) to an authentication mechanism: knowledge (something they and only they know), possession (something they and only they have), and inherence (something they and only they are).

New!!: Access control and Multi-factor authentication · See more »

Mutator method

In computer science, a mutator method is a method used to control changes to a variable.

New!!: Access control and Mutator method · See more »

National Incident Management System

The National Incident Management System (NIMS) is a standardized approach to incident management developed by the United States Department of Homeland Security.

New!!: Access control and National Incident Management System · See more »

National Information Assurance Glossary

Committee on National Security Systems Instruction No.

New!!: Access control and National Information Assurance Glossary · See more »

Near-field communication

Near-field communication (NFC) is a set of communication protocols that enable two electronic devices, one of which is usually a portable device such as a smartphone, to establish communication by bringing them within 4 cm (1.6 in) of each other.

New!!: Access control and Near-field communication · See more »

New Year

New Year is the time or day at which a new calendar year begins and the calendar's year count increments by one.

New!!: Access control and New Year · See more »

New Year's Day

New Year's Day, also called simply New Year's or New Year, is observed on January 1, the first day of the year on the modern Gregorian calendar as well as the Julian calendar.

New!!: Access control and New Year's Day · See more »

New Year's Eve

In the Gregorian calendar, New Year's Eve (also known as Old Year's Day or Saint Sylvester's Day in many countries), the last day of the year, is on 31 December which is the seventh day of Christmastide.

New!!: Access control and New Year's Eve · See more »

Object-capability model

The object-capability model is a computer security model.

New!!: Access control and Object-capability model · See more »

Object-oriented programming

Object-oriented programming (OOP) is a programming paradigm based on the concept of "objects", which may contain data, in the form of fields, often known as attributes; and code, in the form of procedures, often known as methods. A feature of objects is that an object's procedures can access and often modify the data fields of the object with which they are associated (objects have a notion of "this" or "self").

New!!: Access control and Object-oriented programming · See more »

OpenID

OpenID is an open standard and decentralized authentication protocol.

New!!: Access control and OpenID · See more »

Optical turnstile

An optical turnstile is a physical security device designed to restrict or control access to a building or secure area.

New!!: Access control and Optical turnstile · See more »

Organisation-based access control

In computer security, organization-based access control (OrBAC) is an access control model first presented in 2003.

New!!: Access control and Organisation-based access control · See more »

Password

A password is a word or string of characters used for user authentication to prove identity or access approval to gain access to a resource (example: an access code is a type of password), which is to be kept secret from those not allowed access.

New!!: Access control and Password · See more »

Photo identification

Photo identification or photo ID is an identity document that includes a photograph of the holder, usually only his or her face.

New!!: Access control and Photo identification · See more »

Physical security

Physical security describes security measures that are designed to deny unauthorized access to facilities, equipment and resources and to protect personnel and property from damage or harm (such as espionage, theft, or terrorist attacks).

New!!: Access control and Physical security · See more »

Physical security information management

Physical security information management (PSIM) is a category of software that provides a platform and applications created by middleware developers, designed to integrate multiple unconnected security applications and devices and control them through one comprehensive user interface.

New!!: Access control and Physical security information management · See more »

Physical Security Professional

A Physical Security Professional (PSP) is a Board certification process for individuals involved in the physical security of organizations.

New!!: Access control and Physical Security Professional · See more »

Piggybacking (security)

In security, piggybacking, similar to tailgating, refers to when a person tags along with another person who is authorized to gain entry into a restricted area, or pass a certain checkpoint.

New!!: Access control and Piggybacking (security) · See more »

Policy

A policy is a deliberate system of principles to guide decisions and achieve rational outcomes.

New!!: Access control and Policy · See more »

Principle of least privilege

In information security, computer science, and other fields, the principle of least privilege (PoLP, also known as the principle of minimal privilege or the principle of least authority) requires that in a particular abstraction layer of a computing environment, every module (such as a process, a user, or a program, depending on the subject) must be able to access only the information and resources that are necessary for its legitimate purpose.

New!!: Access control and Principle of least privilege · See more »

Prison

A prison, also known as a correctional facility, jail, gaol (dated, British English), penitentiary (American English), detention center (American English), or remand center is a facility in which inmates are forcibly confined and denied a variety of freedoms under the authority of the state.

New!!: Access control and Prison · See more »

Proof-of-payment

Proof-of-payment (POP) or proof-of-fare (POF) is an honor-based fare collection system used on many public transportation systems.

New!!: Access control and Proof-of-payment · See more »

Proximity card

A proximity card or prox card is a "contactless" smart card which can be read without inserting it into a reader device, as required by earlier magnetic stripe cards such as credit cards and "contact" type smart cards.

New!!: Access control and Proximity card · See more »

Resource

A resource is a source or supply from which a benefit is produced.

New!!: Access control and Resource · See more »

Role-based access control

In computer systems security, role-based access control (RBAC) is an approach to restricting system access to authorized users.

New!!: Access control and Role-based access control · See more »

RS-485

RS-485, also known as TIA-485(-A), EIA-485, is a standard defining the electrical characteristics of drivers and receivers for use in serial communications systems. Electrical signaling is balanced, and multipoint systems are supported. The standard is jointly published by the Telecommunications Industry Association and Electronic Industries Alliance (TIA/EIA). Digital communications networks implementing the standard can be used effectively over long distances and in electrically noisy environments. Multiple receivers may be connected to such a network in a linear, multidrop bus. These characteristics make RS-485 useful in industrial control systems and similar applications.

New!!: Access control and RS-485 · See more »

Safe

A safe (also called a strongbox or coffer) is a secure lockable box used for securing valuable objects against theft and/or damage from fire.

New!!: Access control and Safe · See more »

Safe-cracking

Safe-cracking is the process of opening a safe without either the combination or key.

New!!: Access control and Safe-cracking · See more »

Sally port

A sally port is a secure, controlled entryway to a fortification or prison.

New!!: Access control and Sally port · See more »

Security

Security is freedom from, or resilience against, potential harm (or other unwanted coercive change) from external forces.

New!!: Access control and Security · See more »

Security alarm

A security alarm is a system designed to detect intrusion – unauthorized entry – into a building or other area.

New!!: Access control and Security alarm · See more »

Security engineering

Security engineering is a specialized field of engineering that focuses on the security aspects in the design of systems that need to be able to deal robustly with possible sources of disruption, ranging from natural disasters to malicious acts.

New!!: Access control and Security engineering · See more »

Security lighting

In the field of physical security, security lighting is lighting that intended to deter or detect intrusions or other criminal activity on a piece of real property.

New!!: Access control and Security lighting · See more »

Security management

Security management is the identification of an organization's assets (including people, buildings, machines, systems and information assets), followed by the development, documentation, and implementation of policies and procedures for protecting these assets.

New!!: Access control and Security management · See more »

Security policy

Security policy is a definition of what it means to be secure for a system, organization or other entity.

New!!: Access control and Security policy · See more »

Server room

A server room is a room, usually air-conditioned, devoted to the continuous operation of computer servers.

New!!: Access control and Server room · See more »

Shon Harris

Shon Harris (March 27, 1968 – October 8, 2014) was a prolific author of books and articles on topics related to information security, including study guides for CISSP security certification examination.

New!!: Access control and Shon Harris · See more »

Smart card

A smart card, chip card, or integrated circuit card (ICC), is any pocket-sized card that has embedded integrated circuits.

New!!: Access control and Smart card · See more »

Social control

Social control is a concept within the disciplines of the social sciences.

New!!: Access control and Social control · See more »

System

A system is a regularly interacting or interdependent group of items forming an integrated whole.

New!!: Access control and System · See more »

Telecommunication

Telecommunication is the transmission of signs, signals, messages, words, writings, images and sounds or information of any nature by wire, radio, optical or other electromagnetic systems.

New!!: Access control and Telecommunication · See more »

Terminal server

A terminal server enables organizations to connect devices with an RS-232, RS-422 or RS-485 serial interface to a local area network (LAN).

New!!: Access control and Terminal server · See more »

Ticket (admission)

A ticket is a voucher that indicates that an individual is entitled to admission to an event or establishment such as a theatre, amusement park or tourist attraction, or has a right to travel on a vehicle, such as with an airline ticket, bus ticket or train ticket.

New!!: Access control and Ticket (admission) · See more »

Trusted system

In the security engineering subspecialty of computer science, a trusted system is a system that is relied upon to a specified extent to enforce a specified security policy.

New!!: Access control and Trusted system · See more »

Turnstile

A turnstile, also called a baffle gate or turnstyle, is a form of gate which allows one person to pass at a time.

New!!: Access control and Turnstile · See more »

User (telecommunications)

In telecommunications, a user is a person, organization, or other entity that employs the services provided by a telecommunication system, or by an information processing system, for transfer of information.

New!!: Access control and User (telecommunications) · See more »

Vertical service code

A vertical service code (VSC) is a sequence of digits and the signals star (*) and number sign (#) dialed on a telephone keypad or rotary dial to enable or disable certain telephony service features.

New!!: Access control and Vertical service code · See more »

Wiegand effect

The Wiegand effect is a nonlinear magnetic effect, named after its discoverer John R. Wiegand, produced in specially annealed and hardened wire called Wiegand wire.

New!!: Access control and Wiegand effect · See more »

Wiegand interface

The Wiegand interface is a de facto wiring standard which arose from the popularity of Wiegand effect card readers in the 1980s.

New!!: Access control and Wiegand interface · See more »

XACML

XACML stands for "eXtensible Access Control Markup Language".

New!!: Access control and XACML · See more »

.htaccess

A.htaccess (hypertext access) file is a directory-level configuration file supported by several web servers, used for configuration of site-access issues, such as URL redirection, URL shortening, Access-security control (for different webpages and files), and more.

New!!: Access control and .htaccess · See more »

2018

2018 has been designated as the third International Year of the Reef by the International Coral Reef Initiative.

New!!: Access control and 2018 · See more »

2019

2019 (MMXIX) will be a common year starting on Tuesday of the Gregorian calendar, the 2019th year of the Common Era (CE) and Anno Domini (AD) designations, the 19th year of the 3rd millennium, the 19th year of the 21st century, and the 10th and last year of the 2010s decade.

New!!: Access control and 2019 · See more »

Redirects here:

Access Control, Access Control Systems, Access control protocol, Access control system, Access controls, Access policy, Authentication in web, Physical access control, Subject (access control).

References

[1] https://en.wikipedia.org/wiki/Access_control

OutgoingIncoming
Hey! We are on Facebook now! »