access control, back and recovery
- Created by: rbird123
- Created on: 02-12-20 14:11
IT Learning Aim D - Access control, back and recovery.
Purpose of Access control
Computer systems and data need to be protected from access by unauthorised individuals either in person or via electronic means.
Some access system will record ID and time of everyone entering the building or secure area.
Types of Access control
PIN or Password, smart card or electronic key fob, biometric attribute such as face, retinal pattern, fingerprint or voice.
Biometrics
A retinal scan, finger print scan face scan or voice recognition can all be used to identify an individual.
An initial scan is performed to gain the persons characteristics, the pattern is stored in the computer.
If the scan taken matches the stored they are allowed access
Advantages
Security – biometric methods are almost impossible to hack
Convenience – PINS and passwords can be forgotten
Information collected – a company can keep track…
Comments
No comments have yet been made