The Most Common Types of Systems Access Controls

832 Words2 Pages

The most common types of systems access controls

Access control requires unique user identification, emergency access procedure, automatic log-off, and encryption and decryption of data. In order to maintain confidentiality, integrity and availability of data, it is important to control access to the information system. Controls prevent unauthorized users from accessing the system and/or altering data. They also prevent authorized users from making unauthorized changes to data. Some common examples are User-based, Role-based and Context-based access control with the strongest security on Context-based access control.

Controls placed on access are categorized in three ways: preventive, detective, or corrective. The key to access controls is declaring who you are when before entering a system and having the system verify that you are allowed access. This is known as identification and authentication. There are different ways to authenticate users like: PIN, password, phrase, pass code, ATM, token, smart card, fingerprint, retina, etc.

The steps of access controls are: work by identifying and authenticating a user in the system, then authorizing them the user to use or see access an application or data, and finally accounting for what they are doing.

Three symptoms/indications of inadequate systems security protection.

• Inadequate policies, procedures, and culture governing control system security.

Security begins with a culture and mindset of all those involved. “There is a tendency to think of security in terms of a technical solution: firewalls, passwords, etc. “While those elements may cover 20% of the overall solution, common sense approaches to security implemented by plant personnel should make up the remaining 80...

... middle of paper ...

...hardware, software, etc.) to develop appropriate security architecture. Information security models are used to organize and formalize security policies by providing a concept and framework. There are three main types of security models:

• Access control: This model, common in healthcare, allows organizations to identify users and may classify data to allow or restrict access.

• Integrity: This type of model not only protects confidentiality, but also works to protect the integrity of data. An integrity model prevents information from being modified by unauthorized users and prevents authorized users from making unauthorized changes.

• Information flow: In this model, information is classified and flows in a specified manner based on security policies and rules.

Works Cited

http://www.nist.gov

http://www.himss.org/ASP/index.asp

http://library.ahima.org

More about The Most Common Types of Systems Access Controls

Open Document