O'Reilly logo

Fundamentals of Information Systems Security, 3rd Edition by Kim

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 5: Access Controls

ACCESS CONTROLS are methods used to restrict and allow access to certain items, such as automobiles, homes, computers, and even your smartphone. Your first experience with access controls might have been as a child when you locked a brother or sister out of your room or used a locker at school. Similarly, the key to your car fits only your car, so only you can unlock and start it. The same is true of your house or apartment. Many people also use a special code to unlock a smartphone or tablet. No one can unlock the phone or tablet without the code. Or maybe you can’t view certain channels on your television without a security code.

Access control is the process of protecting a resource so that it is used only by ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required