Definitions[]
Computing[]
Access control mechanisms are
“ | [h]ardware, software, or firmware features and operating and management procedures in various combinations designed to detect and prevent unauthorized access and to permit authorized access to a computer system.[1] | ” |
“ | [h]ardware or software features, operating procedures, management procedures, and various combinations of these designed to detect and prevent unauthorized access and to permit authorized access in an automated system.[2] | ” |
“ | [s]ecurity measures designed to detect and deny unauthorized access and permit authorized access to an information system or a physical facility.[3] | ” |
General[]
Access control mechanisms are
“ | [m]easures or procedures designed to prevent unauthorized access to protected information or facilities.[4] | ” |
“ | [s]ecurity measures designed to detect and deny unauthorized access and permit authorized access to an information system or a physical facility.[5] | ” |
U.S. military[]
An access control mechanism
“ | permits managers of a system to exercise a directing or restraining influence over the behavior, use, and content of a system. It permits management to specify what users can do, which resources they can access, and what operations they can perform.[6] | ” |
References[]
- ↑ Auditing and Financial Management: Glossary of EDP Terminology, at 1.
- ↑ Department of Defense, National Computer Security Center, Glossary of Computer Security Terms (NCSC-TG-004, Ver. 1) (Oct. 21, 1988).
- ↑ CNSSI No. 4009.
- ↑ OPSEC Glossary of Terms.
- ↑ NICCS, "Explore Terms: A Glossary of Common Cybersecurity Terminology" (full-text).
- ↑ AR 25-1, at 114.