Access controls

Procedures designed to restrict access to on-line terminal devices, programs and data. Access controls consist of "user authentication" and "user authorization." "User authentication" typically attempts to identify a user through unique logon identifications, passwords, access cards or biometric data. "User authorization" consists of access rules to determine the computer resources each user may access.

There is currently no content classified with this term.

Subscribe to RSS - Access controls