Aswin TS Access Control Simplified Notes Unit 3 Dist Sys
Aswin TS Access Control Simplified Notes Unit 3 Dist Sys
Access control is a system that decides who can use a resource, what they can do with
it, and under what conditions. For example, a company may allow an employee to access
their work computer only during office hours.
Authentication Factors
This means using two or more of the above methods together. For instance, you might log
in with a password (something you know) and a fingerprint (something you are) for extra
security.
Access control works using different models. Each model has its own way of deciding
who gets access:
Allowing access only if the user is part of the “Sales Team” and the request is during
working hours.
The owner of the resource (like a file) decides who gets access.
Example: Only employees with “Top Secret Clearance” can access certain files.
Example: A manager can view and edit employee records, but a regular employee
cannot.
Example: Blocking access if unusual activity is detected, like logging in from a new
country.
Access policies are set for the organization as a whole, without focusing on individuals.
Example: A company-wide rule that all employees can access the intranet.
Controls who can use digital systems like computers, files, or networks.
Today’s IT systems often combine cloud services with on-site networks, making it harder
to control access consistently
Organizations must write clear policies, and IT teams must convert these into working
systems. Coordination is essential.
3. Monitoring and Reporting:
Regularly checking logs helps detect unusual activity and ensures compliance with rules.
For extra security, many systems use multi-factor authentication to verify users in more
than one way.