Difference between revisions of "Access Control"

From BCMpedia. A Wiki Glossary for Business Continuity Management (BCM) and Disaster Recovery (DR).
Jump to navigation Jump to search
 
(8 intermediate revisions by 2 users not shown)
Line 1: Line 1:
 
 
{| style="margin-left: 0px; text-align: left; font-style: none; width:100%; font-weight: none; background: #F0F0F0; border:1px"
 
{| style="margin-left: 0px; text-align: left; font-style: none; width:100%; font-weight: none; background: #F0F0F0; border:1px"
 
|-
 
|-
| '''1.''' In general, only the authorized personnel within an organization should be assigned user accounts with special privileges. Additionally, user accounts have to be managed effectively and the necessary level of access to the equipment should only be provided depending on your authorization level.  
+
| '''1.''' Access control refers to assignment of user accounts with special privileges to only authorized personnel within an organization.  
Related Term:
+
{{Template:BL-BCM-5Banner}}
  
 +
 +
'''Notes''': User accounts have to be managed effectively and the necessary level of access to the equipment should only be provided depending on your authorization level.
 +
 +
{{Template:BLCoursesBanner}}
 
{{Bcm Institute Source}}
 
{{Bcm Institute Source}}
 
 
|}
 
|}
  
 
+
{{Template: BookMGBCMResponse}}
 
 
{{Attend Course: BCMi Right}} {{BCM Institute A Manager's Guide to Business Continuity Management for Cyber Security Incident Response}}
 
  
<br><br><br><br><br><br><br><br><br><br><br>
 
  
'''2.''' Access control refers to security features that control who can access resources in the operating system. Applications call access control functions to set who can access specific resources or control access to resources provided by the application. (Rouse, 2014)
+
'''2.''' Access control refers to security features that control who can access resources in the operating system. Applications call access control functions to set who can access specific resources or control access to resources provided by the application.<br/> '''Source:'''(Rouse, 2014)<br/> <br/>'''3.''' Access control is basically identifying a person doing a specific job, authenticating them by looking at their identification, then giving that person only the key to the door or computer that they need access to and nothing more. In the world of information security, one would look at this as granting an individual permission to get onto a network via a user-name and password, allowing them access to files, computers, or other hardware or software the person requires, and ensuring they have the right level of permission (i.e. read only) to do their job.<br/> '''Source:'''(Gentry, 2012)
<br>
 
'''3.''' Access control is basically identifying a person doing a specific job, authenticating them by looking at their identification, then giving that person only the key to the door or computer that they need access to and nothing more. In the world of information security, one would look at this as granting an individual permission to get onto a network via a user-name and password, allowing them access to files, computers, or other hardware or software the person requires, and ensuring they have the right level of permission (i.e. read only) to do their job. (Gentry, 2012)
 
  
 
[[Category:BCM Institute Cyber Security Glossary]]
 
[[Category:BCM Institute Cyber Security Glossary]]

Latest revision as of 01:54, 3 November 2020

1. Access control refers to assignment of user accounts with special privileges to only authorized personnel within an organization.


Notes: User accounts have to be managed effectively and the necessary level of access to the equipment should only be provided depending on your authorization level.

(Source: Business Continuity Management Institute - BCM Institute)


2. Access control refers to security features that control who can access resources in the operating system. Applications call access control functions to set who can access specific resources or control access to resources provided by the application.
Source:(Rouse, 2014)

3. Access control is basically identifying a person doing a specific job, authenticating them by looking at their identification, then giving that person only the key to the door or computer that they need access to and nothing more. In the world of information security, one would look at this as granting an individual permission to get onto a network via a user-name and password, allowing them access to files, computers, or other hardware or software the person requires, and ensuring they have the right level of permission (i.e. read only) to do their job.
Source:(Gentry, 2012)