1/6
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Define access control and explain its importance in information systems.
Access control refers to security mechanisms that determine who or what is allowed to access or use resources in an information system.
Importance:
Protects sensitive data from unauthorized access.
Prevents data breaches, maintaining confidentiality.
Ensures only authorized users perform specific actions, preserving data integrity.
Supports system availability by managing user permissions efficiently.
What is the purpose of an access control?
Access controls aim to ensure confidentiality, integrity, and availability (CIA triad) of information.
What is Physical Access Control
Mechanisms like locks, biometric scanners, or access cards to restrict entry to physical spaces (e.g., server rooms).
Example: Biometric scanners, key cards, and locks.
Differentiate between physical and logical access control.
Physical access controls, control access to physical spaces like offices or server rooms whilst logical access controls regulates access to digital resources such as data and systems.
What is logical access control?
An access control that protects digital resources using tools like usernames, passwords, firewalls, and encryption.
Example: Passwords, firewalls, encryption, and role-based access systems.
What are Logical access control methods
Passwords
Users enter a secret code or PIN to access resources.
Must follow security best practices (e.g., complex passwords).
Two-Factor Authentication (2FA)
Combines something the user knows (password) with something they have (e.g., OTP from a mobile app).
Biometric Authentication
Uses unique physical attributes like fingerprints, facial recognition, or iris scans.
What are physical access control methods
Locks and Keys
Basic method for controlling entry to secure areas.
Keycards
Cards with embedded technology to unlock doors or gates electronically.
Biometric Scanners
Devices that verify physical characteristics like fingerprints or facial features for access.
Security Guards
Personnel monitoring and granting access to physical premises.
Surveillance Cameras
Used to monitor and record access points for later review.