Access control

When specific means are used to limit access or entry to a place or system, those means are a form of access control. Access control is typically used to ensure privacy and security. It has taken many different forms over the years and has gone from being primarily physical in the early twentieth century to mostly digital in the early twenty-first century (for example, computer privacy). While a business may be protected by a gate and a safe by a combination lock, an email address is protected by a password, and data stored by a business is protected by software. These examples of access control are different ways to achieve the same privacy and security objective, adapted to different situations.

90558232-88959.jpg

Overview

Access control has become not only more electronic but also more specific. For example, the passcode of an entry-level employee at a large company might only allow them access to basic information in the company’s computer systems. However, the passcode of a CEO entered into the same system would result in access to all available information. This is an example of how modern software allows different “keys,” in this case passcodes, to be used in the same “locks,” or computer systems. In this way, access control is used to share systems while strictly controlling who can view and manipulate specific information (network security).

Passcodes are a simple example. A more advanced one is biometrics, the examination of a person’s unique eye or fingerprint characteristics to allow or deny entry to a building or system. Biometric measures are becoming more prevalent because they are hard to duplicate and provide advanced security. Some smartphones even include fingerprint readers as a way of ensuring the right person has access.

When access control is used for physical entry to a place, such as a restricted records room at a company, biometric or password information may be required. Alternatively, a card or other security credential, such as an ID with a magnetic strip, may be used. Companies often use a combination of different forms of access control.

In addition to determining who can gain entry to a system or place, these safeguards can also set additional parameters such as when access is permitted and for how long. For example, an employee at a bank may be allowed access to a vault between 9 a.m. and 5 p.m., but not before or after those times. They may also have duration-limited access, meaning they are allowed access only for a specific amount of time.

These examples illustrate the advanced nature of access control in the twenty-first century. Greater access control allows those in charge to have greater control than they would with a lock and key or with just a password. Access control will continue to evolve as business owners and private citizens use it to maximize their professional and personal security.

Bibliography

Burge, Simon. "What Is Access Control?" International Security Journal, 7 Sept. 2023, internationalsecurityjournal.com/what-is-access-control/#VPN. Accessed 12 Feb. 2025.

Jasper, Scott. Conflict and Cooperation in the Global Commons: A Comprehensive Approach for International Security. Washington: Georgetown UP, 2012. Print.

Gibbons, Robert, and John Roberts. The Handbook of Organizational Economics. Princeton: Princeton UP, 2012. Print.

Mayer-Schönberger, Viktor. Delete: The Virtue of Forgetting in the Digital Age. Princeton: Princeton UP, 2011. Print.

Padgett, John F., and Walter W. Powell. The Emergence of Organizations and Markets. Princeton: Princeton UP, 2012. Print.

Rogers, David L. The Network Is Your Customer: Five Strategies to Thrive in a Digital Age. New Haven: Yale UP, 2011. Print.

Rosenzweig, Roy, and Anthony Grafton. Clio Wired: The Future of the Past in the Digital Age. New York: Columbia UP, 2011. Print.

Snickars, Pelle, and Patrick Vonderau. Moving Data: The iPhone and the Future of Media. New York: Columbia UP, 2012. Print.

West, Darrell M. The Next Wave: Using Digital Technology to Further Social and Political Innovation. New York: Brookings Institution, 2011. Print.

"What Is Access Control? Types, Importance, and Best Practices." SentinelOne, 27 Aug. 2024, www.sentinelone.com/cybersecurity-101/cybersecurity/what-is-access-control/. Accessed 12 Feb. 2024.