2.0 – Access Control Techniques

2.0 – Access Control Techniques
The basic construct in the establishment of information security regime is regulating how resources which are to be accessed will be protected against network vulnerabilities. The control mechanisms deployed vary in nature, and could be administrative, physical or technical. Access Control is a security method which is being used to grant access and certain authority to users in a computing environment. It enables the administrator to specify what particular users can do, which resources can be accessed, and what actions can be performed by users. Such techniques range from simple security techniques to more sophisticated locking systems. Requirement of Access…
To access this content, you must subscribe to this Africa's Sankofa Innovation or Cybersecurity And Digital Forensics, or log in if you are a member.

Share this post