SlideShare a Scribd company logo
ACCESS CONTROL
                    BY:
               M.Vinay kumar




Department of Urban and Regional Planning,
School of Planning and Architecture,
Jawaharlal Nehru Technological University,
Hyderabad.
What is access
control….? control refers to exerting
      Access
control over who can interact with a resource.
Often but not always, this involves an authority,
who does the controlling.
              It be a door, turnstile, parking gate,
elevator, or other physical barrier where
granting access can be electronically
controlled.
AC- How do it secure us…
   Authentication
      Process through which one proves and verifies certain
       information
   Identification
      Process through which one ascertains the identity of
       another person or entity
   Confidentiality
      Protection of private data from unauthorized viewing
   Integrity
      Data is not corrupted or modified in any unauthorized
       manner
How can AC be implemented?
  Hardware

  Software
   Application
   Protocol   (Kerberos, IPSec)
  Physical

  Logical   (policies)
Types of Access control…
   Physical access Security

   Computerized access control
Physical access…
    Access control system operation
    Credential
    Access control system components
    Access control topology
    Types of readers
         Basic (non-intelligent) readers
         Semi-intelligent readers
         Intelligent readers
    Security risks
Computerized access…
    Identification and authentication (I&A)
       Something you know
       Something you have
       Something you are
       Where you are
    Authorization
       Read (R)
        Write (W)
        Execute (X)
Contd…
   Accountability
   Access control models
   Attribute-based access control
   Discretionary access control
   Mandatory access control
   Role-based access control

More Related Content

PPTX
Access control
PDF
Multi Factor Authentication
PPT
Overview
PDF
Access Control Presentation
PPTX
Mit project
PDF
Chapter 3 security principals
PDF
Access_Control_Systems_and_methodology
PPT
Eds user authenticationuser authentication methods
Access control
Multi Factor Authentication
Overview
Access Control Presentation
Mit project
Chapter 3 security principals
Access_Control_Systems_and_methodology
Eds user authenticationuser authentication methods

Viewers also liked (20)

PDF
Green Buildings
PPT
Hybrid Energy Systems
PDF
PPT
Non Destructive Testing Of Materials
PDF
Business Case for Green Buildings
PDF
PDF
PPTX
Green buildings matter
PPTX
TERI-The Energy And Resource Institute
PPSX
Mpls library-greenroof
PPT
Brightech Conference Room Design Build Project
PPTX
Loren Abraham Selected Product Development
PPSX
Loren abraham selected work
PPTX
Presentation11
PPSX
St. Paul Fire Station Green Roof Intrpretive Center and Garden Classroom
PDF
St. Paul Fire Station Green Roof Plant Pallettes
PPT
It parks
PPSX
Daylighting Analysis of Electrochromic switchable glazing compared to convent...
PPTX
Contoh Slide
Green Buildings
Hybrid Energy Systems
Non Destructive Testing Of Materials
Business Case for Green Buildings
Green buildings matter
TERI-The Energy And Resource Institute
Mpls library-greenroof
Brightech Conference Room Design Build Project
Loren Abraham Selected Product Development
Loren abraham selected work
Presentation11
St. Paul Fire Station Green Roof Intrpretive Center and Garden Classroom
St. Paul Fire Station Green Roof Plant Pallettes
It parks
Daylighting Analysis of Electrochromic switchable glazing compared to convent...
Contoh Slide
Ad

Similar to Access control by vinay (20)

PPTX
Domain 5 - Identity and Access Management
PDF
Access Control Fundamentals
PDF
access control systems.pdf Physical Security Domains
PDF
Remote Access Policy Is A Normal Thing
PPTX
Types_of_Access_Controlsggggggggggggggggg
PPT
4_5949547032388570388.ppt
PPT
managingyouraccesscontrolsystems-130223182036-phpapp01
PDF
CC 3-2 Physical access controls.pdf
PDF
PHYSICAL ACCESS CONTROL - AN UNDERSTANDING.pdf
PPTX
Access Control in internet and computer science.pptx
PDF
CC 3-3 Logical access controls.pdf
PDF
Certified Information Systems Security Professional (cissp) Domain “access co...
PPTX
Access Control Methods presentation.pptx
PDF
What is Access Control and Why is it Important for Cybersecurity.pdf
PDF
Is4560
PDF
Audit Controls Paper
PPTX
Access Control for Physical Security and
PDF
The Federal Information Security Management Act
PPTX
GSM SECURITY
PDF
Phases of Building Access Control Systems Houston, TX
Domain 5 - Identity and Access Management
Access Control Fundamentals
access control systems.pdf Physical Security Domains
Remote Access Policy Is A Normal Thing
Types_of_Access_Controlsggggggggggggggggg
4_5949547032388570388.ppt
managingyouraccesscontrolsystems-130223182036-phpapp01
CC 3-2 Physical access controls.pdf
PHYSICAL ACCESS CONTROL - AN UNDERSTANDING.pdf
Access Control in internet and computer science.pptx
CC 3-3 Logical access controls.pdf
Certified Information Systems Security Professional (cissp) Domain “access co...
Access Control Methods presentation.pptx
What is Access Control and Why is it Important for Cybersecurity.pdf
Is4560
Audit Controls Paper
Access Control for Physical Security and
The Federal Information Security Management Act
GSM SECURITY
Phases of Building Access Control Systems Houston, TX
Ad

Recently uploaded (20)

PDF
Deliverable file - Regulatory guideline analysis.pdf
PPTX
Board-Reporting-Package-by-Umbrex-5-23-23.pptx
PPTX
Principles of Marketing, Industrial, Consumers,
PDF
NewBase 12 August 2025 Energy News issue - 1812 by Khaled Al Awadi_compresse...
PDF
Outsourced Audit & Assurance in USA Why Globus Finanza is Your Trusted Choice
PPTX
2025 Product Deck V1.0.pptxCATALOGTCLCIA
DOCX
unit 2 cost accounting- Tender and Quotation & Reconciliation Statement
PPTX
svnfcksanfskjcsnvvjknsnvsdscnsncxasxa saccacxsax
PDF
pdfcoffee.com-opt-b1plus-sb-answers.pdfvi
DOCX
Business Management - unit 1 and 2
PPTX
Amazon (Business Studies) management studies
DOCX
unit 1 COST ACCOUNTING AND COST SHEET
PDF
How to Get Business Funding for Small Business Fast
PDF
Laughter Yoga Basic Learning Workshop Manual
PDF
IFRS Notes in your pocket for study all the time
PDF
Elevate Cleaning Efficiency Using Tallfly Hair Remover Roller Factory Expertise
PPTX
New Microsoft PowerPoint Presentation - Copy.pptx
PPTX
Dragon_Fruit_Cultivation_in Nepal ppt.pptx
PDF
SIMNET Inc – 2023’s Most Trusted IT Services & Solution Provider
PDF
Solara Labs: Empowering Health through Innovative Nutraceutical Solutions
Deliverable file - Regulatory guideline analysis.pdf
Board-Reporting-Package-by-Umbrex-5-23-23.pptx
Principles of Marketing, Industrial, Consumers,
NewBase 12 August 2025 Energy News issue - 1812 by Khaled Al Awadi_compresse...
Outsourced Audit & Assurance in USA Why Globus Finanza is Your Trusted Choice
2025 Product Deck V1.0.pptxCATALOGTCLCIA
unit 2 cost accounting- Tender and Quotation & Reconciliation Statement
svnfcksanfskjcsnvvjknsnvsdscnsncxasxa saccacxsax
pdfcoffee.com-opt-b1plus-sb-answers.pdfvi
Business Management - unit 1 and 2
Amazon (Business Studies) management studies
unit 1 COST ACCOUNTING AND COST SHEET
How to Get Business Funding for Small Business Fast
Laughter Yoga Basic Learning Workshop Manual
IFRS Notes in your pocket for study all the time
Elevate Cleaning Efficiency Using Tallfly Hair Remover Roller Factory Expertise
New Microsoft PowerPoint Presentation - Copy.pptx
Dragon_Fruit_Cultivation_in Nepal ppt.pptx
SIMNET Inc – 2023’s Most Trusted IT Services & Solution Provider
Solara Labs: Empowering Health through Innovative Nutraceutical Solutions

Access control by vinay

  • 1. ACCESS CONTROL BY: M.Vinay kumar Department of Urban and Regional Planning, School of Planning and Architecture, Jawaharlal Nehru Technological University, Hyderabad.
  • 2. What is access control….? control refers to exerting Access control over who can interact with a resource. Often but not always, this involves an authority, who does the controlling. It be a door, turnstile, parking gate, elevator, or other physical barrier where granting access can be electronically controlled.
  • 3. AC- How do it secure us…  Authentication  Process through which one proves and verifies certain information  Identification  Process through which one ascertains the identity of another person or entity  Confidentiality  Protection of private data from unauthorized viewing  Integrity  Data is not corrupted or modified in any unauthorized manner
  • 4. How can AC be implemented?  Hardware  Software  Application  Protocol (Kerberos, IPSec)  Physical  Logical (policies)
  • 5. Types of Access control…  Physical access Security  Computerized access control
  • 6. Physical access…  Access control system operation  Credential  Access control system components  Access control topology  Types of readers Basic (non-intelligent) readers Semi-intelligent readers Intelligent readers  Security risks
  • 7. Computerized access…  Identification and authentication (I&A) Something you know Something you have Something you are Where you are  Authorization Read (R) Write (W) Execute (X)
  • 8. Contd…  Accountability  Access control models  Attribute-based access control  Discretionary access control  Mandatory access control  Role-based access control