0% found this document useful (0 votes)
0 views

Access Control System

Uploaded by

Pooja Choudhary
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
0 views

Access Control System

Uploaded by

Pooja Choudhary
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

ACCESS CONTROL

system

Amruta Makhamale
WHAT IS ACCESS
CONTROL?

ACCESS CONTROL IS A SECURITY


TECHNIQUE THAT REGULATES WHO
OR WHAT CAN VIEW OR USE
RESOURCES IN A COMPUTING
ENVIRONMENT. IT IS A FUNDAMENTAL
CONCEPT IN SECURITY THAT
MINIMIZES RISK TO THE BUSINESS OR
ORGANIZATION.
01 02
TYPES OF ACCESS PHYSICAL LOGICAL
CONTROL PHYSICAL ACCESS LOGICAL ACCESS
CONTROL LIMITS CONTROL LIMITS
ACCESS TO COMPUSES CONNECTIONS TO
BUILDINGS, ROOMS & COMPUTER
IT ASSETS. NETWORKS, SYSTEM
FILES & DATA.
ACCESS CONTROL POLICIES

RULE BASED
ACCESS
DISCRETIONARY CONTROL
ACCESS (RBAC)
BASED ACCESS CONTROL (DAC)
CONTROL
MANDTORY (RBAC)
ACCESS
CONTROL (MAC)
5 STEPS OF ACCESS CONTROL

ASIDE FROM THEIR CLASSIFICATION, ACCESS CONTROL PROCEDURES NORMALLY HAVE 5 MOJOR PHASES-

AUTHORIZATION AUTHENTICATION ACCESSING MANAGEMENT AUDITING


ACCESS CONTROL EXAMPLES
FROM SOURCES ACROSS THE WEB

BLUETO
OTH
DISCRETI
O-NARY PASSWOR
ACCESS D
CONTROL

FOBS
AUTHEN
T- PHYSICAL
ACATIO ACCESS
N
2FA
ACCESS
CONTROL
BIOMETRIC AUTHENTICATION
BIOMETRIC AUTHENTICATION INVOLVES USING SOME PART OF PHYSICAL MAKEUP TO
AUTHENTICATE YOU. THIS COULD BE A

FINGERPR VEIN
FACIAL VOICE IRIS PALM PATTERNSFING
INTS ER
THANK YOU!

You might also like