O'Reilly logo

Fundamentals of Information Systems Security by Michael G. Solomon, David Kim

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 5. Access Controls

ACCESS CONTROLS ARE METHODS used to restrict and allow access to certain items, such as automobiles, homes, computers, even your cell phone. Your first experience with access controls might have been when you locked a sibling out of your room or used a combination lock to secure your valuables in your locker at school. Similarly, the key to your car fits only your car, so only you can unlock and start it. The same is true of your house or apartment. Perhaps you also use a special code to secure access to your cell phone. Only you know that code, so only you can unlock the phone. Or maybe certain channels on your television cannot be seen without a security code.

Access control is the process of protecting a resource so ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required