Access Controls

0.0(0)
studied byStudied by 1 person
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/6

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

7 Terms

1
New cards

Define access control and explain its importance in information systems.

Access control refers to security mechanisms that determine who or what is allowed to access or use resources in an information system.

Importance:

  • Protects sensitive data from unauthorized access.

  • Prevents data breaches, maintaining confidentiality.

  • Ensures only authorized users perform specific actions, preserving data integrity.

  • Supports system availability by managing user permissions efficiently.

2
New cards

What is the purpose of an access control?

Access controls aim to ensure confidentiality, integrity, and availability (CIA triad) of information.

3
New cards

What is Physical Access Control

Mechanisms like locks, biometric scanners, or access cards to restrict entry to physical spaces (e.g., server rooms).

  • Example: Biometric scanners, key cards, and locks.

4
New cards

Differentiate between physical and logical access control.

Physical access controls, control access to physical spaces like offices or server rooms whilst logical access controls regulates access to digital resources such as data and systems.

5
New cards

What is logical access control?

An access control that protects digital resources using tools like usernames, passwords, firewalls, and encryption.

  • Example: Passwords, firewalls, encryption, and role-based access systems.

6
New cards

What are Logical access control methods

  • Passwords

    • Users enter a secret code or PIN to access resources.

    • Must follow security best practices (e.g., complex passwords).

  • Two-Factor Authentication (2FA)

    • Combines something the user knows (password) with something they have (e.g., OTP from a mobile app).

  • Biometric Authentication

    • Uses unique physical attributes like fingerprints, facial recognition, or iris scans.

7
New cards

What are physical access control methods

  • Locks and Keys

    • Basic method for controlling entry to secure areas.

  • Keycards

    • Cards with embedded technology to unlock doors or gates electronically.

  • Biometric Scanners

    • Devices that verify physical characteristics like fingerprints or facial features for access.

  • Security Guards

    • Personnel monitoring and granting access to physical premises.

  • Surveillance Cameras

    • Used to monitor and record access points for later review.