The IT Law Wiki
Advertisement

Definitions[]

Computing[]

Access control mechanisms are

[h]ardware, software, or firmware features and operating and management procedures in various combinations designed to detect and prevent unauthorized access and to permit authorized access to a computer system.[1]
[h]ardware or software features, operating procedures, management procedures, and various combinations of these designed to detect and prevent unauthorized access and to permit authorized access in an automated system.[2]
[s]ecurity measures designed to detect and deny unauthorized access and permit authorized access to an information system or a physical facility.[3]

General[]

Access control mechanisms are

[m]easures or procedures designed to prevent unauthorized access to protected information or facilities.[4]
[s]ecurity measures designed to detect and deny unauthorized access and permit authorized access to an information system or a physical facility.[5]

U.S. military[]

An access control mechanism

permits managers of a system to exercise a directing or restraining influence over the behavior, use, and content of a system. It permits management to specify what users can do, which resources they can access, and what operations they can perform.[6]

References[]

  1. Auditing and Financial Management: Glossary of EDP Terminology, at 1.
  2. Department of Defense, National Computer Security Center, Glossary of Computer Security Terms (NCSC-TG-004, Ver. 1) (Oct. 21, 1988).
  3. CNSSI No. 4009.
  4. OPSEC Glossary of Terms.
  5. NICCS, "Explore Terms: A Glossary of Common Cybersecurity Terminology" (full-text).
  6. AR 25-1, at 114.

See also[]

Advertisement