SlideShare a Scribd company logo
2
Most read
3
Most read
7
Most read
Access Control
EXAMPLES OF ACCESS CONTROL
Some Example of Access Control from
my own experience
Access cards for access sensitive areas.
Biometric to access the data centres and computer rooms.
User name and password and PIN numbers is another example of access control.
RADIUS is another way of access control used for remote login to organization network
By:Merghani Yassin
3 Examples of Access Control
Biometric systems
- Based on exclusive physical attributes, which can be read and digitized
- Such as using fingerprint to access a premise
Mechanical barrier devices: locks
◦ Most widely accepted and employed barrier device
◦ Types of locks include:
◦ Cipher locks
◦ Combination locks
◦ Deadbolt locks
◦ Smart locks
Passive Infrared Request to Exit Device
- motion detector specifically designed to reliably release magnetic locks when a person approaching the door is "seen" by the
motion detector just before reaching the door.
By Marlina Abdul Latib
Access Control Example
Building Access
◦ Permits the right permission to authorize user by using ID card or access card
Private and Confidential Document
◦ Permission will grant to those who are authorize by the document controller personnel using the
control form
◦ The document room only can be access by the document controller personnel
Shared Document on shared server
◦ Document can be download and upload by the user who are log in to the server
◦ Each user have the authorized account to the server
◦ By atiqah muhammad
Access Control (3 examples based on my experience)
• Security guard – visitor registers name and declare
id at gate post or guard identifies authorized
persons at housing area that has gated security
• Employee ID card/token – scan id card at entrance
to enter department or secured areas at workplace
• Biometric scanner – scan fingerprint at an airport
immigration counter to identify passport holder
• By ADILAH SABTU
3 Examples of Access Control
Access card and electronic lock
Individual with legitimate access card can access to the organization.
Stand-alone electric lock is the basic access control to organization, it can be unlocked by
a specific administrator with a switch after confirming the individual identity.
Password
Required password of an employee that needs to access to any organization’s
information system.
So, correct password will be the access control for organization’s information system.
Air-conditioner remote control
A specific air-conditioner has its own remote control.
Only the appropriate air-conditioner remote control can access to its corresponding air-
conditioner and switch it on.
So, the access control for air-conditioner will be controlled by its remote control.
By Heng Shun Ling
3 Examples of Access Controls
Access Card
◦ To enter specific area such as office or residential area.
◦ Present the access card to card reader then card’s information will send to control panel to identify the
authentication and validate the authorization.
Cinema Ticket Checker
◦ A staff check the validity and time of the cinema ticket before enter to cinema hall.
Computer Login
◦ Require to provide password with selected user account in order to access into the computer.
By Li Shan Ting

More Related Content

PPTX
Access Controls
PPTX
Integrated Test Facility
PDF
Access_Control_Systems_and_methodology
PDF
Access Control Presentation
PDF
An overview of access control
PPTX
Test Data Approach
PDF
The 5 security awareness training generations [CARTOON]
PPTX
Investigation of a cyber crime
Access Controls
Integrated Test Facility
Access_Control_Systems_and_methodology
Access Control Presentation
An overview of access control
Test Data Approach
The 5 security awareness training generations [CARTOON]
Investigation of a cyber crime

What's hot (20)

PPTX
Digital Forensics by William C. Barker (NIST)
PPT
Information Security Policies and Standards
PDF
Overview on data privacy
PDF
Basics in IT Audit and Application Control Testing
PPT
Chapter2 the need to security
PPTX
Password Policy and Account Lockout Policies
PPTX
Security Policies and Standards
PDF
Digital forensic principles and procedure
PPTX
CISA Training - Chapter 1 - 2016
PDF
Electronic Transaction Act 2063 (ETA 2063)
PPTX
Cybercrime investigation
PPTX
Hacking ppt
PPT
Ethics for it professionals and it users
PDF
Email Forensics
PPT
Digital copyright
PPT
Ch07 Access Control Fundamentals
PPTX
Difference between Cyber and digital Forensic.pptx
PPT
Cyber forensics
PPTX
Auditing the expenditure cycle
Digital Forensics by William C. Barker (NIST)
Information Security Policies and Standards
Overview on data privacy
Basics in IT Audit and Application Control Testing
Chapter2 the need to security
Password Policy and Account Lockout Policies
Security Policies and Standards
Digital forensic principles and procedure
CISA Training - Chapter 1 - 2016
Electronic Transaction Act 2063 (ETA 2063)
Cybercrime investigation
Hacking ppt
Ethics for it professionals and it users
Email Forensics
Digital copyright
Ch07 Access Control Fundamentals
Difference between Cyber and digital Forensic.pptx
Cyber forensics
Auditing the expenditure cycle
Ad

Similar to Example of access control (20)

PPTX
Access-control-system
PDF
access control systems.pdf Physical Security Domains
PDF
What is door access control system.pdf
PDF
PHYSICAL ACCESS CONTROL - AN UNDERSTANDING.pdf
PPTX
Beyond the Cards The Future of Security Systems and Access Control Systems in...
DOCX
Access control
PPT
Eds user authenticationuser authentication methods
PPT
Access control basics-5
PDF
Choosing the Right SIRA-Approved Access Control Systems for Your Dubai Busine...
PPTX
GSM SECURITY
PDF
C True Presentation V9
PPTX
Controls for Digital Signature (e-Sign) Cloud Network & eCommerce Application
PPTX
Cryptography in user authentication
PPTX
الاردوينو uno التصمييم ب استخدام -1.pptx
PPTX
Access control systems
PDF
TheGRID - Stop Identity Theft
PPTX
Access Control Systems
PDF
Phases of Building Access Control Systems Houston, TX
PPTX
Advanced Access Control Systems A Key to Office Security.pptx
PPTX
Broken Authentication and Authorization(1).pptx
Access-control-system
access control systems.pdf Physical Security Domains
What is door access control system.pdf
PHYSICAL ACCESS CONTROL - AN UNDERSTANDING.pdf
Beyond the Cards The Future of Security Systems and Access Control Systems in...
Access control
Eds user authenticationuser authentication methods
Access control basics-5
Choosing the Right SIRA-Approved Access Control Systems for Your Dubai Busine...
GSM SECURITY
C True Presentation V9
Controls for Digital Signature (e-Sign) Cloud Network & eCommerce Application
Cryptography in user authentication
الاردوينو uno التصمييم ب استخدام -1.pptx
Access control systems
TheGRID - Stop Identity Theft
Access Control Systems
Phases of Building Access Control Systems Houston, TX
Advanced Access Control Systems A Key to Office Security.pptx
Broken Authentication and Authorization(1).pptx
Ad

More from Hafiza Abas (20)

PPTX
animated semut dengan menggunakan path animation.
PPTX
Teknologi ePembelajaran
PPTX
Access Controls Attacks
PPTX
Task 6 access_control_attacks_hong_kim_sheng_2
PPTX
SPSS LEVEL 2
PPTX
Islamic studies for disabled: teaching Salat for Autism Using Apps
PPTX
Quantitative search and_qualitative_research by mubarak
PPTX
Chap 15 Method
PPTX
Chap 6 Avoiding Ambiguity
PPTX
Chapter 14 Review of the Literature
PPTX
Chapter 5 Be Concise
PPTX
Chapter 13 Introduction in research paper
PPTX
Chapter 4 Structuring Paragraph and Sentences
PPTX
Chapter 12: Abstract ( english for writing research papers)
PPTX
Chapter 3 Breaking up long sentences (ENGLISH FOR WRITING RESEARCH PAPERS)
PPT
English for writing research papers (chap 2 and 11)
PDF
Assessment vs. evaluation
PDF
Rubric
PPT
Business Continuity Plan (Introduction)
PPTX
Access control attacks by nor liyana binti azman
animated semut dengan menggunakan path animation.
Teknologi ePembelajaran
Access Controls Attacks
Task 6 access_control_attacks_hong_kim_sheng_2
SPSS LEVEL 2
Islamic studies for disabled: teaching Salat for Autism Using Apps
Quantitative search and_qualitative_research by mubarak
Chap 15 Method
Chap 6 Avoiding Ambiguity
Chapter 14 Review of the Literature
Chapter 5 Be Concise
Chapter 13 Introduction in research paper
Chapter 4 Structuring Paragraph and Sentences
Chapter 12: Abstract ( english for writing research papers)
Chapter 3 Breaking up long sentences (ENGLISH FOR WRITING RESEARCH PAPERS)
English for writing research papers (chap 2 and 11)
Assessment vs. evaluation
Rubric
Business Continuity Plan (Introduction)
Access control attacks by nor liyana binti azman

Recently uploaded (20)

PDF
Pre independence Education in Inndia.pdf
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PDF
Basic Mud Logging Guide for educational purpose
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
VCE English Exam - Section C Student Revision Booklet
PPTX
GDM (1) (1).pptx small presentation for students
PPTX
PPH.pptx obstetrics and gynecology in nursing
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
RMMM.pdf make it easy to upload and study
PPTX
Cell Structure & Organelles in detailed.
PPTX
Pharma ospi slides which help in ospi learning
PDF
O7-L3 Supply Chain Operations - ICLT Program
PDF
Complications of Minimal Access Surgery at WLH
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
Computing-Curriculum for Schools in Ghana
Pre independence Education in Inndia.pdf
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
Basic Mud Logging Guide for educational purpose
O5-L3 Freight Transport Ops (International) V1.pdf
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
VCE English Exam - Section C Student Revision Booklet
GDM (1) (1).pptx small presentation for students
PPH.pptx obstetrics and gynecology in nursing
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
2.FourierTransform-ShortQuestionswithAnswers.pdf
FourierSeries-QuestionsWithAnswers(Part-A).pdf
RMMM.pdf make it easy to upload and study
Cell Structure & Organelles in detailed.
Pharma ospi slides which help in ospi learning
O7-L3 Supply Chain Operations - ICLT Program
Complications of Minimal Access Surgery at WLH
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Computing-Curriculum for Schools in Ghana

Example of access control

  • 1. Access Control EXAMPLES OF ACCESS CONTROL
  • 2. Some Example of Access Control from my own experience Access cards for access sensitive areas. Biometric to access the data centres and computer rooms. User name and password and PIN numbers is another example of access control. RADIUS is another way of access control used for remote login to organization network By:Merghani Yassin
  • 3. 3 Examples of Access Control Biometric systems - Based on exclusive physical attributes, which can be read and digitized - Such as using fingerprint to access a premise Mechanical barrier devices: locks ◦ Most widely accepted and employed barrier device ◦ Types of locks include: ◦ Cipher locks ◦ Combination locks ◦ Deadbolt locks ◦ Smart locks Passive Infrared Request to Exit Device - motion detector specifically designed to reliably release magnetic locks when a person approaching the door is "seen" by the motion detector just before reaching the door. By Marlina Abdul Latib
  • 4. Access Control Example Building Access ◦ Permits the right permission to authorize user by using ID card or access card Private and Confidential Document ◦ Permission will grant to those who are authorize by the document controller personnel using the control form ◦ The document room only can be access by the document controller personnel Shared Document on shared server ◦ Document can be download and upload by the user who are log in to the server ◦ Each user have the authorized account to the server ◦ By atiqah muhammad
  • 5. Access Control (3 examples based on my experience) • Security guard – visitor registers name and declare id at gate post or guard identifies authorized persons at housing area that has gated security • Employee ID card/token – scan id card at entrance to enter department or secured areas at workplace • Biometric scanner – scan fingerprint at an airport immigration counter to identify passport holder • By ADILAH SABTU
  • 6. 3 Examples of Access Control Access card and electronic lock Individual with legitimate access card can access to the organization. Stand-alone electric lock is the basic access control to organization, it can be unlocked by a specific administrator with a switch after confirming the individual identity. Password Required password of an employee that needs to access to any organization’s information system. So, correct password will be the access control for organization’s information system. Air-conditioner remote control A specific air-conditioner has its own remote control. Only the appropriate air-conditioner remote control can access to its corresponding air- conditioner and switch it on. So, the access control for air-conditioner will be controlled by its remote control. By Heng Shun Ling
  • 7. 3 Examples of Access Controls Access Card ◦ To enter specific area such as office or residential area. ◦ Present the access card to card reader then card’s information will send to control panel to identify the authentication and validate the authorization. Cinema Ticket Checker ◦ A staff check the validity and time of the cinema ticket before enter to cinema hall. Computer Login ◦ Require to provide password with selected user account in order to access into the computer. By Li Shan Ting