111 relations: Access badge, Access control list, Access Control Matrix, Access modifiers, Accountability, Alarm device, Alarm management, Attribute-based access control, Audit trail, Authentication, Authorization, Automated information system, Bank vault, Barbed tape, Biometrics, Bluetooth Low Energy, Border guard, Bouncer (doorman), Capability-based security, Card reader, Castle, Common Access Card, Computer security, Contactless smart card, Coupling, Credential, Current loop, Data, Data storage, Database, Database transaction, Discretionary access control, Door, Door security, Electronic lock, Encapsulation (computer programming), Federal Standard 1037C, Fence, Fingerprint, Fortification, Identity document, Identity management, Identity-based security, Information hiding, Information security, Internet Protocol, IP access controller, IP reader, Key management, Keychain, ..., Light-emitting diode, Lock (security device), Lock bumping, Lock picking, Lock screen, Logical security, Login, Magnetic stripe card, Malware, Mandatory access control, Mantrap (access control), MIL-STD-188, Multi-factor authentication, Mutator method, National Incident Management System, National Information Assurance Glossary, Near-field communication, Object-capability model, Object-oriented programming, OpenID, Optical turnstile, Organisation-based access control, Password, Photo identification, Physical security, Physical security information management, Physical Security Professional, Piggybacking (security), Policy, Principle of least privilege, Prison, Proof-of-payment, Proximity card, Resource, Role-based access control, RS-485, Safe, Safe-cracking, Sally port, Security, Security alarm, Security engineering, Security lighting, Security management, Security policy, Server room, Shon Harris, Smart card, Social control, System, Telecommunication, Terminal server, Ticket (admission), Trusted system, Turnstile, User (telecommunications), Vertical service code, Wiegand effect, Wiegand interface, XACML, .htaccess. Expand index (61 more) » « Shrink index
An access badge is a credential used to gain entry to an area having automated access control entry points.
New!!: Access control and Access badge ·
An access control list (ACL), with respect to a computer file system, is a list of permissions attached to an object.
In computer science, an Access Control Matrix or Access Matrix is an abstract, formal security model of protection state in computer systems, that characterizes the rights of each subject with respect to every object in the system.
Access modifiers (or access specifiers) are keywords in object-oriented languages that set the accessibility of classes, methods, and other members.
New!!: Access control and Access modifiers ·
In ethics and governance, accountability is answerability, blameworthiness, liability, and the expectation of account-giving.
New!!: Access control and Accountability ·
An alarm device or system of alarm devices gives an audible, visual or other form of alarm signal about a problem or condition.
New!!: Access control and Alarm device ·
Alarm management is the application of human factors (or 'ergonomics') along with instrumentation engineering and systems thinking to manage the design of an alarm system to increase its usability.
New!!: Access control and Alarm management ·
Attribute-based access control (ABAC) defines an access control paradigm whereby access rights are granted to users through the use of policies which combine attributes together.
An audit trail (also called audit log) is a security-relevant chronological record, set of records, and/or destination and source of records that provide documentary evidence of the sequence of activities that have affected at any time a specific operation, procedure, or event.
New!!: Access control and Audit trail ·
Authentication (from authentikos, "real, genuine", from αὐθέντης authentes, "author") is the act of confirming the truth of an attribute of a single piece of data claimed true by an entity.
New!!: Access control and Authentication ·
Authorization is the function of specifying access rights/privileges to resources related to information security and computer security in general and to access control in particular.
New!!: Access control and Authorization ·
An automated information system (AIS) is an assembly of computer hardware, software, firmware, or any combination of these, configured to accomplish specific information-handling operations, such as communication, computation, dissemination, processing, and storage of information.
A bank vault is a secure space where money, valuables, records, and documents are stored.
New!!: Access control and Bank vault ·
Barbed tape or razor wire is a mesh of metal strips with sharp edges whose purpose is to prevent passage by humans.
New!!: Access control and Barbed tape ·
Biometrics is the technical term for body measurements and calculations.
New!!: Access control and Biometrics ·
Bluetooth Low Energy (Bluetooth LE, colloquially BLE, formerly marketed as Bluetooth Smart) is a wireless personal area network technology designed and marketed by the Bluetooth Special Interest Group (Bluetooth SIG) aimed at novel applications in the healthcare, fitness, beacons, security, and home entertainment industries.
A border guard of a country is a national security agency that performs border control, i.e., enforces the security of the country's national borders.
New!!: Access control and Border guard ·
A bouncer (also known as a doorman, door supervisor or cooler) is a type of security guard, employed at venues such as bars, nightclubs, stripclubs, casinos, restaurants or concerts.
New!!: Access control and Bouncer (doorman) ·
Capability-based security is a concept in the design of secure computing systems, one of the existing security models.
A card reader is a data input device that reads data from a card-shaped storage medium.
New!!: Access control and Card reader ·
A castle (from castellum) is a type of fortified structure built during the Middle Ages by predominantly the nobility or royalty and by military orders.
New!!: Access control and Castle ·
The Common Access Card, also commonly referred to as the CAC or CAC card, is a smart card about the size of a credit card.
Cybersecurity, computer security or IT security is the protection of computer systems from theft of or damage to their hardware, software or electronic data, as well as from disruption or misdirection of the services they provide.
New!!: Access control and Computer security ·
A contactless smart card is a contactless credential whose dimensions are credit-card size.
A coupling is a device used to connect two shafts together at their ends for the purpose of transmitting power.
New!!: Access control and Coupling ·
Examples of credentials include academic diplomas, academic degrees, certifications, security clearances, identification documents, badges, passwords, user names, keys, powers of attorney, and so on.
New!!: Access control and Credential ·
In electrical signalling an analog current loop is used where a device must be monitored or controlled remotely over a pair of conductors.
New!!: Access control and Current loop ·
Data is a set of values of qualitative or quantitative variables.
New!!: Access control and Data ·
Data storage is the recording (storing) of information (data) in a storage medium.
New!!: Access control and Data storage ·
A database is an organized collection of data, stored and accessed electronically.
New!!: Access control and Database ·
A transaction symbolizes a unit of work performed within a database management system (or similar system) against a database, and treated in a coherent and reliable way independent of other transactions.
In computer security, discretionary access control (DAC) is a type of access control defined by the Trusted Computer System Evaluation Criteria "as a means of restricting access to objects based on the identity of subjects and/or groups to which they belong.
A door is a moving mechanism used to block off and allow access to, an entrance to or within an enclosed space, such as a building, room or vehicle.
New!!: Access control and Door ·
The term door security may refer to any of a range of measures used to strengthen doors against door breaching, Ram-raiding and lock picking, and prevent crimes such as burglary and home invasions.
New!!: Access control and Door security ·
An electronic lock (or electric lock) is a locking device which operates by means of electric current.
New!!: Access control and Electronic lock ·
In object oriented programming languages, encapsulation is used to refer to one of two related but distinct notions, and sometimes to the combination thereof.
Federal Standard 1037C, titled Telecommunications: Glossary of Telecommunication Terms, is a United States Federal Standard issued by the General Services Administration pursuant to the Federal Property and Administrative Services Act of 1949, as amended.
A fence is a structure that encloses an area, typically outdoors, and is usually constructed from posts that are connected by boards, wire, rails or netting.
New!!: Access control and Fence ·
A fingerprint in its narrow sense is an impression left by the friction ridges of a human finger.
New!!: Access control and Fingerprint ·
A fortification is a military construction or building designed for the defense of territories in warfare; and is also used to solidify rule in a region during peacetime.
New!!: Access control and Fortification ·
An identity document (also called a piece of identification or ID, or colloquially as papers) is any document which may be used to prove a person's identity.
New!!: Access control and Identity document ·
Identity management, also known as identity and access management (IAM) is, in computer security, the security and business discipline that "enables the right individuals to access the right resources at the right times and for the right reasons".
Identity-based security is an approach to control access to a digital product or service based on the authenticated identity of an individual.
In computer science, information hiding is the principle of segregation of the design decisions in a computer program that are most likely to change, thus protecting other parts of the program from extensive modification if the design decision is changed.
Information security, sometimes shortened to InfoSec, is the practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction of information.
The Internet Protocol (IP) is the principal communications protocol in the Internet protocol suite for relaying datagrams across network boundaries.
New!!: Access control and Internet Protocol ·
IP access controller is an electronic security device designed to identify users and control entry to or exit from protected areas.
IP reader is an electronic security device designed to identify users and control entry to or exit from protected areas.
New!!: Access control and IP reader ·
Key management refers to management of cryptographic keys in a cryptosystem.
New!!: Access control and Key management ·
A keychain, or keyring, is a small chain, usually made from metal or plastic, that connects a small item to a keyring.
New!!: Access control and Keychain ·
A light-emitting diode (LED) is a two-lead semiconductor light source.
A lock is a mechanical or electronic fastening device that is released by a physical object (such as a key, keycard, fingerprint, RFID card, security token, coin etc.), by supplying secret information (such as a keycode or password), or by a combination thereof.
Lock bumping is a lock picking technique for opening a pin tumbler lock using a specially crafted bump key, rapping key or a 999 key.
New!!: Access control and Lock bumping ·
Although lock picking can be associated with criminal intent, it is an essential skill for the legitimate profession of locksmithing, and is also pursued by law-abiding citizens as a useful skill to learn, or simply as a hobby (locksport).
New!!: Access control and Lock picking ·
A lock screen is a computer user interface element used by various operating systems.
New!!: Access control and Lock screen ·
Logical Security consists of software safeguards for an organization’s systems, including user identification and password access, authenticating, access rights and authority levels.
New!!: Access control and Logical security ·
In computer security, logging in (or logging on or signing in or signing on) is the process by which an individual gains access to a computer system by identifying and authenticating themselves.
New!!: Access control and Login ·
A magnetic stripe card is a type of card capable of storing data by modifying the magnetism of tiny iron-based magnetic particles on a band of magnetic material on the card.
Malware (a portmanteau for malicious software) is any software intentionally designed to cause damage to a computer, server or computer network.
New!!: Access control and Malware ·
In computer security, mandatory access control (MAC) refers to a type of access control by which the operating system constrains the ability of a subject or initiator to access or generally perform some sort of operation on an object or target.
A mantrap, air lock, sally port or access control vestibule is a physical security access control system comprising a small space with two sets of interlocking doors, such that the first set of doors must close before the second set opens.
MIL-STD-188 is a series of U.S. military standards relating to telecommunications.
New!!: Access control and MIL-STD-188 ·
Multi-factor authentication (MFA) is a method of confirming a user's claimed identity in which a user is granted access only after successfully presenting 2 or more pieces of evidence (or factors) to an authentication mechanism: knowledge (something they and only they know), possession (something they and only they have), and inherence (something they and only they are).
In computer science, a mutator method is a method used to control changes to a variable.
New!!: Access control and Mutator method ·
The National Incident Management System (NIMS) is a standardized approach to incident management developed by the United States Department of Homeland Security.
Committee on National Security Systems Instruction No.
Near-field communication (NFC) is a set of communication protocols that enable two electronic devices, one of which is usually a portable device such as a smartphone, to establish communication by bringing them within 4 cm (1.6 in) of each other.
The object-capability model is a computer security model.
Object-oriented programming (OOP) is a programming paradigm based on the concept of "objects", which may contain data, in the form of fields, often known as attributes; and code, in the form of procedures, often known as methods. A feature of objects is that an object's procedures can access and often modify the data fields of the object with which they are associated (objects have a notion of "this" or "self").
OpenID is an open standard and decentralized authentication protocol.
New!!: Access control and OpenID ·
An optical turnstile is a physical security device designed to restrict or control access to a building or secure area.
New!!: Access control and Optical turnstile ·
In computer security, organization-based access control (OrBAC) is an access control model first presented in 2003.
A password is a word or string of characters used for user authentication to prove identity or access approval to gain access to a resource (example: an access code is a type of password), which is to be kept secret from those not allowed access.
New!!: Access control and Password ·
Photo identification or photo ID is an identity document that includes a photograph of the holder, usually only his or her face.
Physical security describes security measures that are designed to deny unauthorized access to facilities, equipment and resources and to protect personnel and property from damage or harm (such as espionage, theft, or terrorist attacks).
New!!: Access control and Physical security ·
Physical security information management (PSIM) is a category of software that provides a platform and applications created by middleware developers, designed to integrate multiple unconnected security applications and devices and control them through one comprehensive user interface.
A Physical Security Professional (PSP) is a Board certification process for individuals involved in the physical security of organizations.
In security, piggybacking, similar to tailgating, refers to when a person tags along with another person who is authorized to gain entry into a restricted area, or pass a certain checkpoint.
A policy is a deliberate system of principles to guide decisions and achieve rational outcomes.
New!!: Access control and Policy ·
In information security, computer science, and other fields, the principle of least privilege (PoLP, also known as the principle of minimal privilege or the principle of least authority) requires that in a particular abstraction layer of a computing environment, every module (such as a process, a user, or a program, depending on the subject) must be able to access only the information and resources that are necessary for its legitimate purpose.
A prison, also known as a correctional facility, jail, gaol (dated, British English), penitentiary (American English), detention center (American English), or remand center is a facility in which inmates are forcibly confined and denied a variety of freedoms under the authority of the state.
New!!: Access control and Prison ·
Proof-of-payment (POP) or proof-of-fare (POF) is an honor-based fare collection system used on many public transportation systems.
New!!: Access control and Proof-of-payment ·
A proximity card or prox card is a "contactless" smart card which can be read without inserting it into a reader device, as required by earlier magnetic stripe cards such as credit cards and "contact" type smart cards.
New!!: Access control and Proximity card ·
A resource is a source or supply from which a benefit is produced.
New!!: Access control and Resource ·
In computer systems security, role-based access control (RBAC) is an approach to restricting system access to authorized users.
RS-485, also known as TIA-485(-A), EIA-485, is a standard defining the electrical characteristics of drivers and receivers for use in serial communications systems. Electrical signaling is balanced, and multipoint systems are supported. The standard is jointly published by the Telecommunications Industry Association and Electronic Industries Alliance (TIA/EIA). Digital communications networks implementing the standard can be used effectively over long distances and in electrically noisy environments. Multiple receivers may be connected to such a network in a linear, multidrop bus. These characteristics make RS-485 useful in industrial control systems and similar applications.
New!!: Access control and RS-485 ·
A safe (also called a strongbox or coffer) is a secure lockable box used for securing valuable objects against theft and/or damage from fire.
New!!: Access control and Safe ·
Safe-cracking is the process of opening a safe without either the combination or key.
New!!: Access control and Safe-cracking ·
A sally port is a secure, controlled entryway to a fortification or prison.
New!!: Access control and Sally port ·
Security is freedom from, or resilience against, potential harm (or other unwanted coercive change) from external forces.
New!!: Access control and Security ·
A security alarm is a system designed to detect intrusion – unauthorized entry – into a building or other area.
New!!: Access control and Security alarm ·
Security engineering is a specialized field of engineering that focuses on the security aspects in the design of systems that need to be able to deal robustly with possible sources of disruption, ranging from natural disasters to malicious acts.
In the field of physical security, security lighting is lighting that intended to deter or detect intrusions or other criminal activity on a piece of real property.
New!!: Access control and Security lighting ·
Security management is the identification of an organization's assets (including people, buildings, machines, systems and information assets), followed by the development, documentation, and implementation of policies and procedures for protecting these assets.
Security policy is a definition of what it means to be secure for a system, organization or other entity.
New!!: Access control and Security policy ·
A server room is a room, usually air-conditioned, devoted to the continuous operation of computer servers.
New!!: Access control and Server room ·
Shon Harris (March 27, 1968 – October 8, 2014) was a prolific author of books and articles on topics related to information security, including study guides for CISSP security certification examination.
New!!: Access control and Shon Harris ·
A smart card, chip card, or integrated circuit card (ICC), is any pocket-sized card that has embedded integrated circuits.
New!!: Access control and Smart card ·
Social control is a concept within the disciplines of the social sciences.
New!!: Access control and Social control ·
A system is a regularly interacting or interdependent group of items forming an integrated whole.
New!!: Access control and System ·
Telecommunication is the transmission of signs, signals, messages, words, writings, images and sounds or information of any nature by wire, radio, optical or other electromagnetic systems.
New!!: Access control and Telecommunication ·
A terminal server enables organizations to connect devices with an RS-232, RS-422 or RS-485 serial interface to a local area network (LAN).
New!!: Access control and Terminal server ·
A ticket is a voucher that indicates that an individual is entitled to admission to an event or establishment such as a theatre, amusement park or tourist attraction, or has a right to travel on a vehicle, such as with an airline ticket, bus ticket or train ticket.
In the security engineering subspecialty of computer science, a trusted system is a system that is relied upon to a specified extent to enforce a specified security policy.
New!!: Access control and Trusted system ·
A turnstile, also called a baffle gate or turnstyle, is a form of gate which allows one person to pass at a time.
New!!: Access control and Turnstile ·
In telecommunications, a user is a person, organization, or other entity that employs the services provided by a telecommunication system, or by an information processing system, for transfer of information.
A vertical service code (VSC) is a sequence of digits and the signals star (*) and number sign (#) dialed on a telephone keypad or rotary dial to enable or disable certain telephony service features.
The Wiegand effect is a nonlinear magnetic effect, named after its discoverer John R. Wiegand, produced in specially annealed and hardened wire called Wiegand wire.
New!!: Access control and Wiegand effect ·
The Wiegand interface is a de facto wiring standard which arose from the popularity of Wiegand effect card readers in the 1980s.
New!!: Access control and Wiegand interface ·
XACML stands for "eXtensible Access Control Markup Language".
New!!: Access control and XACML ·
A.htaccess (hypertext access) file is a directory-level configuration file supported by several web servers, used for configuration of site-access issues, such as URL redirection, URL shortening, Access-security control (for different webpages and files), and more.
New!!: Access control and .htaccess ·