top of page
ACCESS-CONTROL-SLIDER_2.jpg

The Access Control

Access Control Systems - A Short Discussion

Access control is an integrated security technique that controls who, what can access resources in a controlled computing environment. logical access control restricts access to system data, system files, and applications. It is typically used to limit access to specific users or departments. There are three major categories of access control, discretionary, physical, and technical access. Each type has its own advantages and limitations.

access-control-systems-1040x555-1-768x410.jpg

The most common access control systems are the combination lock, card access control systems, magnetic locks, key padlocks, and biometric access control systems. A combination lock provides the maximum level of access control by combining a combination card reader, keypad, and proximity reader. In this case, only one person is needed to operate the system. If two people are required to work on the system, then a master card access control system is advisable. These systems can be controlled by push buttons and touch screen remote controllers.

 

Manual access control systems are used when you don't want or need to restrict access to particular resource objects. These resource objects can be computers, software, operating system programs, printers, fax machines, personal digital assistants (PDAs), telephone sets, and the like. Manual access systems have several advantages over electronic access control systems. They provide security without any potential drawbacks such as human error, time and space constraints, and staffing requirements.

 

When implementing access control systems, it is important for the network administrator to store sensitive data in a separate location. This storage facility should be protected from unauthorized access. It is preferable to use a locking device to ensure the confidentiality of the stored sensitive data. When using a locking device, the administrator is able to remotely lock or unlock the doors of the storage location whenever required.

bottom of page