access control, back and recovery

?
  • Created by: rbird123
  • Created on: 02-12-20 14:11

IT  Learning Aim D - Access control, back and recovery.

Purpose of Access control 

Computer systems and data need to be protected from access by unauthorised individuals either in person or via electronic means. 

Some access system will record ID and time of everyone entering the building or secure area.

Types of Access control

PIN or Password,  smart card or electronic key fob, biometric attribute such as face, retinal pattern, fingerprint or voice. 

Biometrics

A retinal scan, finger print scan face scan or voice recognition can all be used to identify an individual.

An initial scan is performed to gain the persons characteristics, the pattern is stored in the computer. 

If the scan taken matches the stored they are allowed access

Advantages 

Security – biometric methods are almost impossible to hack

Convenience – PINS and passwords can be forgotten

Information collected – a company can keep track

Comments

No comments have yet been made