answersLogoWhite

0


Best Answer

Security access control limits what a user can see, use or access within a network. This is important because it restricts the ability to access data to those who are authorized to work with it.

User Avatar

Wiki User

10y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: In terms of computer security what is the security access control needed for?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Continue Learning about Computer Science

When customers use a computer to access the internet sate one output device needed to produce a paper copy of the booking?

When customers use a computer to access the Internet, state one output device needed to produce a paper copy of the booking.


What network devices are needed to hook up 5 computers with no internet or email access?

Each computer needs a network card (NIC); you need a hub or switch; and for every computer you need a network cable to connect to the switch.


What are the benefits of using an internet based email service?

The benefits of using an internet based email service are they are universal, they are easy to access, no additional software is needed, easy to learn and customize. It also saves storage space and you don't have to own a computer to access the emails, you can access the mail from any computer.


How does one use an access control system?

Access control is more and more of a concern for many as privacy invasion becomes more commonplace. Logically, the first step toward protecting privacy is governing access to your personal space. As the need has risen, so have the companies who claim to have the right system for you. With security systems, one size never fits all. Before going out and buying the wrong system for your particular application, do some access control system research. Do a personal access inventory. Identify and evaluate access vulnerabilities, and the best way to shore up access protection of these areas of exposure. Establish perimeters and review options for securing them. Set your security perimeter. Decide on the level of access control that is needed and what you are comfortable with. Think about and check out the available technologies for the system you have in mind. Make your list of who will share access, and who will be excluded. Make sure that each person on your access list agrees, and is willing to keep his access information confidential. Instruct them not to share it with friends or others who are "harmless." Restriction of access is, after all, the whole idea behind a control system. Do not trust your security to newcomers. Shop your access system requirements. Meet with and speak to three or four well-established, trusted companies in your area about what you want. Schedule a time for them to do an on-site estimate. Be present for that on-site evaluation; do not leave it to someone else. Narrow down your system company prospects to two; then, carefully re-evaluate what each offers. Compare pricing versus what the package presented really offers. Check out their work by asking for and visiting at least two of their current customers. Quickly resolve any doubts you may have about your new system. Re-evaluate one final time on your way to your final decision, after making your site visits. Look specifically for the best reliability of the system. Consider next the convenience and level of comfort you personally feel about each system you are considering. Review how the system works, and assess your degree of confidence with it. Do not buy a system that you feel is too complicated to operate. Do not buy a system you do not have complete protection confidence in, and do not buy a system that is too pricey for what it offers.


Serial and direct access?

direct access allows you to access the needed record directly with serial access u have to go through all the others before arriving to the desired one

Related questions

What is physical access restriction?

Physical access is a term in computer security that refers to the ability of people to physically gain access to a computer system. According to Gregory White, "Given physical access to an office, the knowledgeable attacker will quickly be able to find the information needed to gain access to the organization's computer systems and network."


What is physical restriction?

Physical access is a term in computer security that refers to the ability of people to physically gain access to a computer system. According to Gregory White, "Given physical access to an office, the knowledgeable attacker will quickly be able to find the information needed to gain access to the organization's computer systems and network."


What is the minimum amount of equipment needed for a home security monitor?

The minimum requirements one needs for a home security system are: at least one entry detector, a simple motion detector and a control panel (computer).


How do you enter some your computer from your computer?

Actually you can access someones computer when your and his computer is connected to internet. His computer is needed to be configured and configuration ID should be obtained then you can access other computer remotely.


What are needed to access requirements of computer crimes?

qwerty whopedoooooooo!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!


Is CPU needed to access internet?

A CPU is needed to do anything with a computer, including accessing the internet.


Why exactly is IP security needed?

The reason why IP or Internet Protocol security is needed is because if anyone knows your IP address they would be able to hack your computer if there were no IP security.


Why file protection is needed?

For security- so that unauthorized users do not have access to it or cannot modify it.


What is controlled access?

Access control refers to exerting control over who can interact with a resource. Often but not always, this involves an authority, who does the controlling. The resource can be a given building, group of buildings, or computer-based information system.Access control is, in reality, an everyday phenomenon. A lock on a car door is essentially a form of access control. A PIN on an ATM system at a bank is another means of access control. The possession of access control is of prime importance when persons seek to secure important, confidential, or sensitive information and equipment.[citation needed]Item control or electronic key management is an area within (and possibly integrated with) an access control system which concerns the managing of possession and location of small assets or physical (mechanical) keys.[citation needed]


What is controlled access protocol?

Access control refers to exerting control over who can interact with a resource. Often but not always, this involves an authority, who does the controlling. The resource can be a given building, group of buildings, or computer-based information system.Access control is, in reality, an everyday phenomenon. A lock on a car door is essentially a form of access control. A PIN on an ATM system at a bank is another means of access control. The possession of access control is of prime importance when persons seek to secure important, confidential, or sensitive information and equipment.[citation needed]Item control or electronic key management is an area within (and possibly integrated with) an access control system which concerns the managing of possession and location of small assets or physical (mechanical) keys.[citation needed]


What is needed to access virtual world?

just a computer and a profile on that virtual world


Why is network security needed?

To make sure Viruses and Malicious software can't attack your computer.