Accesscontrol is a type of security technique applied in a system thatrequires regulation. Two types of access control are of primaryconcern. These are the physical and logical access control. Aphysical control limits access to certain premises, such as buildingsand rooms, while logical access restricts the connection of thenetwork system and files. Therefore, this essay will present aresearch paper on access control system.
Thereare four major categories of access control. These comprise ofmandatory access control, discretional, role based as well asrule-based access control. The access control system operates onauthorization identification, authentication, access approval, aswell as accountability of entities. All these models are very crucialin every organization as far as the security protocol is concerned(Achim, 2009).
Themandatory access control abbreviated as MAC is a vital securityapproach employed by the resource proprietors. It can reject theaccess to resource objects in a particular file system. The principleof MAC is derived from the system administrator. The final users haveno capability of altering the system since the OS (operating system)enforces it. The technique of MAC is mostly used by governmentoffices and military facilities. Each of the file system objects isassigned a classification label such as top secret or confidential.
Whenevera person wants to get access to a particular resource, the operatingsystem checks his/her credentials to determine if it can guaranteeaccess to the files. Therefore, MAC is considered as one of the bestaccess control techniques (Gollmann, 2011). Organizations employingsuch technology need careful planning and continuous monitoring oftheir system. These measures are necessary to keep up to date withall the resource objects and classification practices.
Discretionalaccess control (DAC) is a type of system that works on the processthat either grants or restricts object access. There is an accesspolicy that involves the object’s owner determining the access ofthe system. User’s identification determines the system controlthrough credentials during authentication. It can be in the form of ausername or password. The owner has the right to determine the objectaccess privileges and can transform the information access to otherusers (Achim, 2009).
Role-basedaccess control abbreviated as RBAC is a strategy of regulating theright to use computer network and resources. The regulation isestablished on the roles assigned to distinct users in anorganization. The role allocated to the person in an enterprisedepends on the job competency and authority. When the implementationof RBAC is properly executed, it allows the users to do a broad rangeof authorized tasks. It is made possible by the actions of the usersand regulated according to the flexible functions (Gollmann, 2011).
Therule-based access control is based on the rules that grant or denyaccess to certain resources. For instance, this model is applied tothe usage of routers and a list of control access. The router ACLsdetermine the IPs or port numbers that are granted the access througha router. Rules are present to determine such operation. There are nouser accounts and security labels in this mechanism. In some cases,this model is regarded as a form of MAC (Mandatory ).
Personnelsuch as bodyguards and bouncers can enforce the geographical accesscontrol. Construction of fences can also be done to hinder access tothe premises (Achim, 2009). The physical means encompasses usingmechanical methods such as locks and keys to prevent access.Inother cases, technological means can assist prevent access forinstance, the use of access control system mantrap. The accesscontrol system regulates where or when a person is allowed to enteror exit.
Theelectronic access control operates on computers to solve thelimitations that may arise from the use of mechanical locks. Severalcredentials may be incorporated into the computer systems to replacethe mechanical keys. When the security is installed in the computers,it requires a person to fill the credential details for the access tothe control systems. As soon as the access is granted, the time ofthe transaction is recorded and stored for further reference.
Accesscontrol system operates with the help of a control panel. It is ahighly reliable processor which relates the credential information tothe access control list. After that, it grants or denies thepresented request. Depending on the response from the control panel,a transaction log is sent to a database. The door will be locked whenthe control panel denies the presented requested. If the credentialsmatch the one on the access control list, the door becomes unlocked.The control panel also prevents an alarm by ignoring the door opensignal (Gollmann, 2011).
Inconclusion, the access control system is crucial to the organizationsince it limits the security threat the firm may face. It helpsrestrict the unauthorized entrance of personnel to access resourcesor systems. These systems facilitate safe and appropriate managementpractices.
Achim, B. (2009). Extending access control models with Breaking glass. Symposium on Models and Technologies, 197-206.
Gollmann, D. (2011). Unifying identity management and access control. Computer Security, 387.