answersLogoWhite

0

Security access control limits what a user can see, use or access within a network. This is important because it restricts the ability to access data to those who are authorized to work with it.

User Avatar

Wiki User

12y ago

What else can I help you with?

Related Questions

What is physical access restriction?

Physical access is a term in computer security that refers to the ability of people to physically gain access to a computer system. According to Gregory White, "Given physical access to an office, the knowledgeable attacker will quickly be able to find the information needed to gain access to the organization's computer systems and network."


What is physical restriction?

Physical access is a term in computer security that refers to the ability of people to physically gain access to a computer system. According to Gregory White, "Given physical access to an office, the knowledgeable attacker will quickly be able to find the information needed to gain access to the organization's computer systems and network."


What is the minimum amount of equipment needed for a home security monitor?

The minimum requirements one needs for a home security system are: at least one entry detector, a simple motion detector and a control panel (computer).


How do you enter some your computer from your computer?

Actually you can access someones computer when your and his computer is connected to internet. His computer is needed to be configured and configuration ID should be obtained then you can access other computer remotely.


What are needed to access requirements of computer crimes?

qwerty whopedoooooooo!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!


Is CPU needed to access internet?

A CPU is needed to do anything with a computer, including accessing the internet.


What is controlled access protocol?

Access control refers to exerting control over who can interact with a resource. Often but not always, this involves an authority, who does the controlling. The resource can be a given building, group of buildings, or computer-based information system.Access control is, in reality, an everyday phenomenon. A lock on a car door is essentially a form of access control. A PIN on an ATM system at a bank is another means of access control. The possession of access control is of prime importance when persons seek to secure important, confidential, or sensitive information and equipment.[citation needed]Item control or electronic key management is an area within (and possibly integrated with) an access control system which concerns the managing of possession and location of small assets or physical (mechanical) keys.[citation needed]


What is controlled access?

Access control refers to exerting control over who can interact with a resource. Often but not always, this involves an authority, who does the controlling. The resource can be a given building, group of buildings, or computer-based information system.Access control is, in reality, an everyday phenomenon. A lock on a car door is essentially a form of access control. A PIN on an ATM system at a bank is another means of access control. The possession of access control is of prime importance when persons seek to secure important, confidential, or sensitive information and equipment.[citation needed]Item control or electronic key management is an area within (and possibly integrated with) an access control system which concerns the managing of possession and location of small assets or physical (mechanical) keys.[citation needed]


Why file protection is needed?

For security- so that unauthorized users do not have access to it or cannot modify it.


What is needed to access virtual world?

just a computer and a profile on that virtual world


Why is network security needed?

To make sure Viruses and Malicious software can't attack your computer.


What does a cloud on a computer allow you to do?

A cloud on a computer allows you to store and access data and applications over the internet rather than on your local device. This enables you to access your files from anywhere, collaborate with others in real-time, and scale storage or computing resources as needed. Additionally, cloud services often provide enhanced security and backup options for your data.