Home Common Problem What is access control divided into?

What is access control divided into?

Jun 10, 2021 am 11:09 AM
Access control

Access control is divided into physical access control and logical access control; physical access control, such as users, equipment, doors, locks and security environment requirements stipulated in the standard, while logical access control is based on data It is implemented at the levels of , application, system, network and permissions.

What is access control divided into?

The operating environment of this article: windows7 system, DELL G3 computer

What are the classifications of access control?

Access control can be divided into two levels: physical access control and logical access control. Physical access control meets the requirements of users, devices, doors, locks, and security environments stipulated in the standard, while logical access control is implemented at the data, application, system, network, and permission levels.

Access control technology refers to preventing unauthorized access to any resources, so that the computer system can be used within the legal scope. It refers to a technology that restricts the user's access to certain information items or the use of certain control functions by the user's identity and the defined group to which it belongs. For example, the principle of the UniNAC network access control system is based on this. On top of technology.

Access control is usually used by system administrators to control users' access to network resources such as servers, directories, files, etc.

The concept and elements of access control

Access Control refers to the system's ability to restrict the use of data resources by the user's identity and the predefined policy groups to which it belongs. s method. It is usually used by system administrators to control users' access to network resources such as servers, directories, files, etc. Access control is an important basis for system confidentiality, integrity, availability and legal use. It is one of the key strategies for network security prevention and resource protection. It is also the subject's different actions on the object itself or its resources based on certain control policies or permissions. Authorized access.

The main purpose of access control is to restrict the access subject's access to the object, thereby ensuring that data resources can be effectively used and managed within the legal scope. In order to achieve the above purpose, access control needs to complete two tasks: identify and confirm the user accessing the system, and determine what type of access the user can have to a certain system resource.

Access control includes three elements: subject, object and control policy.

(1) Subject S (Subject). Refers to making a specific request to access a resource. It is the initiator of a certain operation action, but not necessarily the executor of the action. It may be a certain user, or it may be a process, service, device, etc. started by the user.

(2) Object O (Object). Refers to the entity of the resource being accessed. All information, resources, and objects that can be manipulated can be objects. The object can be a collection of information, files, records, etc., or it can be a hardware facility on the network, a terminal in wireless communication, or even another object.

(3) Control strategy A (Attribution). It is a collection of relevant access rules for subjects to objects, that is, a collection of attributes. Access policy embodies an authorization behavior and is also the object's default for certain operational behaviors of the subject.

Function and principle of access control

The main functions of access control include: ensuring that legitimate users access authorized protected network resources and preventing illegal subjects from entering the protected network resources, or prevent legitimate users from unauthorized access to protected network resources. Access control first requires verifying the legitimacy of user identities, and at the same time using control policies for selection and management. After the user's identity and access rights are verified, it is also necessary to monitor unauthorized operations. Therefore, the content of access control includes authentication, control policy implementation and security audit.

(1) Certification. Including the subject's identification of the object and the object's inspection and confirmation of the subject.

(2) Control strategy. By setting a reasonable set of control rules, we ensure that users can use information resources legally within the scope of authorization. It is necessary not only to ensure the reasonable use of authorized users, but also to prevent illegal users from entering the system through infringement and leaking important information resources. At the same time, legal users cannot exceed their authority to exercise functions and access scope beyond their authority.

(3) Security audit. The system can automatically conduct systematic and independent inspection and verification of relevant activities or behaviors in the computer network environment based on the user's access rights, and make corresponding evaluations and audits.

For more related knowledge, please visit the FAQ column!

The above is the detailed content of What is access control divided into?. For more information, please follow other related articles on the PHP Chinese website!

Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

Video Face Swap

Video Face Swap

Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

How to use Vue for permission management and access control How to use Vue for permission management and access control Aug 02, 2023 pm 09:01 PM

How to use Vue for permission management and access control In modern web applications, permission management and access control is a critical feature. As a popular JavaScript framework, Vue provides a simple and flexible way to implement permission management and access control. This article will introduce how to use Vue to implement basic permission management and access control functions, and attach code examples. Defining Roles and Permissions Before you begin, you first need to define the roles and permissions in your application. A role is a specific set of permissions, and

Use Go language to solve large-scale access control problems Use Go language to solve large-scale access control problems Jun 15, 2023 pm 02:59 PM

With the development of the Internet, access control issues have increasingly become an important topic. In traditional permission management, role authorization or access control lists are generally used to control resources. However, this method is often unable to adapt to large-scale access control needs because it is difficult to flexibly implement access control for different roles and resources. To solve this problem, using Go language to solve large-scale access control problems has become an effective method. Go language is a language for concurrent programming. It has excellent concurrency performance and fast compilation.

How Nginx implements access control configuration based on request source IP How Nginx implements access control configuration based on request source IP Nov 08, 2023 am 10:09 AM

How Nginx implements access control configuration based on the request source IP requires specific code examples. In network application development, protecting the server from malicious attacks is a very important step. Using Nginx as a reverse proxy server, we can configure IP access control to restrict access to specific IP addresses to improve server security. This article will introduce how to implement access control configuration based on request source IP in Nginx and provide specific code examples. First, we need to edit the Nginx configuration file

An in-depth exploration of Nginx's traffic analysis and access control methods An in-depth exploration of Nginx's traffic analysis and access control methods Aug 05, 2023 pm 05:46 PM

An in-depth discussion of Nginx's traffic analysis and access control methods. Nginx is a high-performance open source web server. It is powerful and scalable, so it is widely used in the Internet field. In practical applications, we usually need to analyze Nginx traffic and control access. This article will delve into Nginx's traffic analysis and access control methods and provide corresponding code examples. 1. Nginx traffic analysis Nginx provides many built-in variables that can be used to analyze traffic. Among them, commonly used

Access Control Editor cannot be opened in Win10 Access Control Editor cannot be opened in Win10 Jan 03, 2024 pm 10:05 PM

The inability to open the access control editor in win10 is an uncommon problem. This problem usually occurs in external hard drives and USB flash drives. In fact, the solution is very simple. Just open it in safe mode and take a look. Let’s take a look at the details below. tutorial. Win10 cannot open the access control editor 1. In the login interface, hold down shift, click the button, click 2.--, click 3. After restarting, press F5 to try to enter and see if you can enter. Articles related to win10 safe mode>>>How to enter win10 safe mode<<<>>>How to repair the system in win10 safe mode<<<

Implementing Role-Based Access Control (RBAC): Using PHP and RBAC Implementing Role-Based Access Control (RBAC): Using PHP and RBAC Jun 20, 2023 pm 10:39 PM

With the popularity of Internet applications, we hope to protect data within the application to ensure that sensitive data is not misused or stolen. One of the solutions is to use role-based access control (RBAC). Role-based access control (RBAC) is an access control model based on the relationship between users and roles. The core idea of ​​this model is to link the user's role to the access control operation, rather than linking the access control operation directly to the user. This approach improves the flexibility of access control,

How does PHP handle cross-domain requests and access control? How does PHP handle cross-domain requests and access control? Jun 30, 2023 pm 11:04 PM

How does PHP handle cross-domain requests and access control? Abstract: With the development of Internet applications, cross-domain requests and access control have become an important issue in PHP development. This article will introduce methods and techniques on how PHP handles cross-domain requests and access control, aiming to help developers better understand and deal with these issues. What is a cross-domain request? Cross-domain request means that in the browser, a web page in one domain requests to access resources in another domain. Cross-domain requests generally occur in AJAX requests, image/script/css references, etc. Depend on

Nginx access control configuration to restrict access to specified users Nginx access control configuration to restrict access to specified users Jul 04, 2023 am 10:37 AM

Nginx access control configuration to restrict access to specified users. In a web server, access control is an important security measure used to restrict access rights to specific users or IP addresses. As a high-performance web server, Nginx also provides powerful access control functions. This article will introduce how to use Nginx configuration to limit the access permissions of specified users, and provide code examples for reference. First, we need to prepare a basic Nginx configuration file. Assume we already have a website with a configuration file path of