SlideShare a Scribd company logo
Definition:
Access control is a security technique that regulates who or what can view or use resources in a
computing environment. It is a fundamental concept in security that minimizes risk to the business
or organization.
Importance
The goal of access control is to minimize the security risk of unauthorized access to physical and
logical systems. Access control is a fundamental component of security compliance programs that
ensures security technology and access control policies are in place to protect confidential
information, such as customer data. Most organizations have infrastructure and procedures that
limit access to networks, computer systems, applications, files and sensitive data, such as
personally identifiable information and intellectual property. Access control systems are complex
and can be challenging to manage in dynamic IT environments that involve on-premises systems
and cloud services. After high-profile breaches, technology vendors have shifted away from single
sign-on systems to unified access management, which offers access controls for on-premises and
cloud environments.
Why we use it?
We use to minimize the security risk of unauthorized access to physical and logical systems.
How it works
Access controls identify an individual or entity, verify the person or application is who or what it
claims to be, and authorizes the access level and set of actions associated with the username or IP
address. Directory services and protocols, including Lightweight Directory Access Protocol
and Security Assertion Markup Language, provide access controls for authenticating and
authorizing users and entities and enabling them to connect to computer resources, such as
distributed applications and web servers.

More Related Content

PDF
Access Control Fundamentals
PPTX
Access control on digital marketing topic
PDF
Importance of Access Control System for Your Organization Security
PPTX
Chapter 9: Access Control Management
PPTX
Access Control in internet and computer science.pptx
PPTX
Domain 5 - Identity and Access Management
PDF
What is Access Control and Why is it Important for Cybersecurity.pdf
PPTX
Access control
Access Control Fundamentals
Access control on digital marketing topic
Importance of Access Control System for Your Organization Security
Chapter 9: Access Control Management
Access Control in internet and computer science.pptx
Domain 5 - Identity and Access Management
What is Access Control and Why is it Important for Cybersecurity.pdf
Access control

Similar to Access system.docx (20)

PPT
4_5949547032388570388.ppt
PPTX
GSM SECURITY
PDF
Audit Controls Paper
PDF
Access Control for Windows
PDF
Access Control and Identity Management Information Systems Security Assurance...
PDF
Access Control System_ An Overview - Bahaa Abdul Hadi.pdf
PPT
Sameer Mitter - Access Control in Cloud Security
PPTX
Access Control and Maintenance.pptx
PPTX
Access Controls
PDF
Importance of Access Control Systems for Business Security.pdf
PDF
Certified Information Systems Security Professional (cissp) Domain “access co...
PPTX
Lecture-12-ACL_information_Security.pptx
PPTX
009 Authentication and Access Control.pptx
PDF
Access Control Its basically refers to the various set of methods a.pdf
DOCX
Comprehensive Analysis of Contemporary Information Security Challenges
PPT
Access control by amin
PPT
educational content,educational content,educational content,
PPT
CompTIA Security+ Module1: Security fundamentals
PDF
The Ultimate Guide to Access Control Systems_ Enhancing Security and Efficien...
PPTX
Access C systrm.pptx
4_5949547032388570388.ppt
GSM SECURITY
Audit Controls Paper
Access Control for Windows
Access Control and Identity Management Information Systems Security Assurance...
Access Control System_ An Overview - Bahaa Abdul Hadi.pdf
Sameer Mitter - Access Control in Cloud Security
Access Control and Maintenance.pptx
Access Controls
Importance of Access Control Systems for Business Security.pdf
Certified Information Systems Security Professional (cissp) Domain “access co...
Lecture-12-ACL_information_Security.pptx
009 Authentication and Access Control.pptx
Access Control Its basically refers to the various set of methods a.pdf
Comprehensive Analysis of Contemporary Information Security Challenges
Access control by amin
educational content,educational content,educational content,
CompTIA Security+ Module1: Security fundamentals
The Ultimate Guide to Access Control Systems_ Enhancing Security and Efficien...
Access C systrm.pptx

More from Waseelsultan (16)

DOCX
Positive and negative things of internet.docx
DOCX
enprership progect.docx
DOCX
Cybersecurity governance-1.docx
DOCX
data Analysis.docx
DOCX
DNA Viruses-1.docx
PPTX
الباب الثالث - الربيعات والمئينات.pptx
PPTX
pdf-flexible-manufacturing-systemfms.pptx
PPT
Cell_Manufacturing.ppt
PDF
the 8 wastes of lean manufacturing include.pdf
PDF
a159280334379.pdf
DOCX
ethics%20assignment1.docx
DOCX
MacDonald SWOT Analysis.docx
PPTX
tommy.pptx
PPTX
MACDONALDS.pptx
PPTX
Measuring the quality of health services for patients.pptx
PPTX
CS3501.pptx
Positive and negative things of internet.docx
enprership progect.docx
Cybersecurity governance-1.docx
data Analysis.docx
DNA Viruses-1.docx
الباب الثالث - الربيعات والمئينات.pptx
pdf-flexible-manufacturing-systemfms.pptx
Cell_Manufacturing.ppt
the 8 wastes of lean manufacturing include.pdf
a159280334379.pdf
ethics%20assignment1.docx
MacDonald SWOT Analysis.docx
tommy.pptx
MACDONALDS.pptx
Measuring the quality of health services for patients.pptx
CS3501.pptx

Recently uploaded (20)

PPTX
mbdjdhjjodule 5-1 rhfhhfjtjjhafbrhfnfbbfnb
PPTX
IB Computer Science - Internal Assessment.pptx
PPTX
DISORDERS OF THE LIVER, GALLBLADDER AND PANCREASE (1).pptx
PPT
Reliability_Chapter_ presentation 1221.5784
PPTX
Introduction to Basics of Ethical Hacking and Penetration Testing -Unit No. 1...
PPTX
Introduction to machine learning and Linear Models
PDF
Introduction to the R Programming Language
PPTX
Data_Analytics_and_PowerBI_Presentation.pptx
PPTX
Acceptance and paychological effects of mandatory extra coach I classes.pptx
PDF
Clinical guidelines as a resource for EBP(1).pdf
PPTX
Market Analysis -202507- Wind-Solar+Hybrid+Street+Lights+for+the+North+Amer...
PDF
Galatica Smart Energy Infrastructure Startup Pitch Deck
PDF
22.Patil - Early prediction of Alzheimer’s disease using convolutional neural...
PPTX
Introduction to Knowledge Engineering Part 1
PPT
Quality review (1)_presentation of this 21
PPTX
Introduction-to-Cloud-ComputingFinal.pptx
PPTX
IBA_Chapter_11_Slides_Final_Accessible.pptx
PDF
Business Analytics and business intelligence.pdf
PPTX
Qualitative Qantitative and Mixed Methods.pptx
PDF
168300704-gasification-ppt.pdfhghhhsjsjhsuxush
mbdjdhjjodule 5-1 rhfhhfjtjjhafbrhfnfbbfnb
IB Computer Science - Internal Assessment.pptx
DISORDERS OF THE LIVER, GALLBLADDER AND PANCREASE (1).pptx
Reliability_Chapter_ presentation 1221.5784
Introduction to Basics of Ethical Hacking and Penetration Testing -Unit No. 1...
Introduction to machine learning and Linear Models
Introduction to the R Programming Language
Data_Analytics_and_PowerBI_Presentation.pptx
Acceptance and paychological effects of mandatory extra coach I classes.pptx
Clinical guidelines as a resource for EBP(1).pdf
Market Analysis -202507- Wind-Solar+Hybrid+Street+Lights+for+the+North+Amer...
Galatica Smart Energy Infrastructure Startup Pitch Deck
22.Patil - Early prediction of Alzheimer’s disease using convolutional neural...
Introduction to Knowledge Engineering Part 1
Quality review (1)_presentation of this 21
Introduction-to-Cloud-ComputingFinal.pptx
IBA_Chapter_11_Slides_Final_Accessible.pptx
Business Analytics and business intelligence.pdf
Qualitative Qantitative and Mixed Methods.pptx
168300704-gasification-ppt.pdfhghhhsjsjhsuxush

Access system.docx

  • 1. Definition: Access control is a security technique that regulates who or what can view or use resources in a computing environment. It is a fundamental concept in security that minimizes risk to the business or organization. Importance The goal of access control is to minimize the security risk of unauthorized access to physical and logical systems. Access control is a fundamental component of security compliance programs that ensures security technology and access control policies are in place to protect confidential information, such as customer data. Most organizations have infrastructure and procedures that limit access to networks, computer systems, applications, files and sensitive data, such as personally identifiable information and intellectual property. Access control systems are complex and can be challenging to manage in dynamic IT environments that involve on-premises systems and cloud services. After high-profile breaches, technology vendors have shifted away from single sign-on systems to unified access management, which offers access controls for on-premises and cloud environments. Why we use it? We use to minimize the security risk of unauthorized access to physical and logical systems. How it works Access controls identify an individual or entity, verify the person or application is who or what it claims to be, and authorizes the access level and set of actions associated with the username or IP address. Directory services and protocols, including Lightweight Directory Access Protocol and Security Assertion Markup Language, provide access controls for authenticating and authorizing users and entities and enabling them to connect to computer resources, such as distributed applications and web servers.