O'Reilly logo

CISSP in 21 Days - Second Edition by M. L. Srinivasan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Physical and logical access to assets

In information technology, physical access includes access to physical assets such as facilities, operational areas, and data centers. Logical access includes access to computing assets such as operating systems, application programs, and networks that include the Internet/intranet, information, and data.

Access to physical or logical assets is attempted by entities such as people, programs, or scripts. From the perspective of access, every entity that is trying to access physical or logical assets through any method is considered to be anonymous before some sort of method is used to determine the identity of the entity, and subsequently the access permission. The information security domain that deals with ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required