Access control is implemented to regulate access within a network, or to a resource. Various techniques are used for implementing access control, including authentication, authorisation, passwords, identifying and verifying users, assigning privileges and permissions, and tracking and monitoring access to resources. Access control can be implemented using software, hardware or a combination of both, and is an essential component of any comprehensive cybersecurity strategy.
See also: APPLICATION, INTERNET
Sandhu, R.S. and Samarati, P., 1994. Access control: principle and practice. IEEE Communications Magazine, 32(9), 40–8, https://doi.org/10.1109/35.312842.
Sandhu, R.S. and Samarati, P., 1994. Access control: principle and practice. IEEE Communications Magazine, 32(9), 40–8, https://doi.org/10.1109/35.312842.