Access Control

From BCMpedia. A Wiki Glossary for Business Continuity Management (BCM) and Disaster Recovery (DR).
Jump to navigation Jump to search
1. Access control refers to assignment of user accounts with special privileges to only authorized personnel within an organization.
BL-B-5 Click to know more


Notes: User accounts have to be managed effectively and the necessary level of access to the equipment should only be provided depending on your authorization level.

Click to know more about expert level training

(Source: Business Continuity Management Institute - BCM Institute)

A Manager’s Guide to Business Continuity Management for Cybersecurity Incident Response


2. Access control refers to security features that control who can access resources in the operating system. Applications call access control functions to set who can access specific resources or control access to resources provided by the application.
Source:(Rouse, 2014)

3. Access control is basically identifying a person doing a specific job, authenticating them by looking at their identification, then giving that person only the key to the door or computer that they need access to and nothing more. In the world of information security, one would look at this as granting an individual permission to get onto a network via a user-name and password, allowing them access to files, computers, or other hardware or software the person requires, and ensuring they have the right level of permission (i.e. read only) to do their job.
Source:(Gentry, 2012)