- Access Control Model A framework that dictates how subjects (users or processes) access objects (resources) within a system. Common models include Discretionary Access Control (DAC), where access is granted based on user identity; Mandatory Access Control (MAC), where access is determined by comparing the labels (clearances) of the users and the data; and Role-Based Access Control (RBAC), where permissions are based on user roles rather than individual user identities.
- Access Level A categorization of the degree of authorization that a user has when accessing a network or system. These levels often correspond to the roles of users and determine what kind of operations they can perform on the system. For instance, a user with an administrative access level has more permissions compared to a user with a standard access level. Defining access levels is a key part of access control and is crucial for maintaining system security and data integrity.
- Access management lifecycle The set of processes and procedures for managing access to a system or network, from initial user authentication to ongoing monitoring and revoking of access. It is used in organizations to ensure the security of their networks and data and to prevent unauthorized access. Examples include implementing password policies, conducting regular audits of user access, and providing training on secure access practices.
- Access Method The technique or protocol that a system uses to locate and retrieve data from storage or transmit data over a network. Different access methods might be used depending on the type of data, the storage medium, or the network architecture. By defining standard access methods, systems can ensure data interoperability, optimize performance, and maintain data integrity and security.
- Access Path The route or means through which data is retrieved from a database. This typically involves a series of steps or operations that the database management system executes based on a given query, such as scanning an index or traversing a table. Efficient access paths can significantly improve query performance and system responsiveness while also ensuring that data access adheres to security and integrity constraints.
- Access point (AP) A device that connects wireless devices to a wired network, allowing them to communicate and access resources on the network. It is used in wireless networks to provide connectivity and access to network resources. Examples of access points include routers and wireless hotspots.
- Access Profile A predefined set of permissions and settings that determines what a user or role can do within a system. It can include parameters such as data access rights, available functionalities, and interface customization. By assigning users to appropriate access profiles, a system can effectively control access, streamline user management, and ensure that users have the necessary capabilities to perform their tasks without compromising security.
- Access Rights The privileges or permissions that are granted to a user or group of users within a system or network. These rights can include the ability to read, write, modify, or delete data, as well as access specific resources or functions within the system. For example, a user may have read-only access to a company's financial reports, while another user may have full access to the company's customer database.
- Access Server A server that controls access to a network and its resources, often by providing authentication, authorization, and accounting services. It can serve as a point of entry into a network, handling connection requests from users and deciding whether to grant or deny access based on predefined policies. By centralizing access control, an access server enhances security, simplifies management, and provides a foundation for auditing and monitoring user activities.
- Access Type The kind of operations that a user or role can perform on a resource within a system. Common access types include read (viewing data), write (modifying data), execute (running a program or script), and delete (removing data). Defining access types is a critical part of access control, as it helps maintain data integrity, prevent unauthorized actions, and ensure that users have the necessary permissions to perform their tasks.
Share our FREE glossary with your friends and study buddies.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions, if you find errors please contact us.