Saturday, August 13, 2011

SECURITY TECHNOLOGY

III.  ACCESS CONTROL SOFTWARE


Image credit from Google.com.ph
Access control is a mechanism which a system grants or revokes the right to access the data. It is commonly used by the user to login to a system using "Authentication System".  




It controls the following data:
  • File permission such as create, read and edit on file servers.
  • Program permissions, such as the right to execute a program on application servers.
  • Data rights, such as the right to retrieve or update information in a database.


(http://hitachi-id.com/concepts/access_control.html) 




Also it include the following:

  • Automate and unify visioning, role management, password management, single sign-on and privileged account management.
  • Ensure that identity and access management activities are supporting business objectives.
  • Provide segregation of duties and access control.


(http://www.quest.com/identity-management/)