Access control refers to exerting control over who can interact with a resource. Often but not always, this involves an authority, who does the controlling. The resource can be a given building, group of buildings, or computer-based information system.
Access control is, in reality, an everyday phenomenon. A lock on a car door is essentially a form of access control. A PIN on an ATM system at a bank is another means of access control. The possession of access control is of prime importance when persons seek to secure important, confidential, or sensitive information and equipment.
Item control or electronic key management is an area within (and possibly integrated with) an access control system which concerns the managing of possession and location of small assets or physical (mechanical) keys.
Read more about Access Control: Physical Security, Computer Security, Telecommunication, Public Policy
Famous quotes containing the words access and/or control:
“The Hacker Ethic: Access to computersand anything which might teach you something about the way the world worksshould be unlimited and total.
Always yield to the Hands-On Imperative!
All information should be free.
Mistrust authoritypromote decentralization.
Hackers should be judged by their hacking, not bogus criteria such as degrees, age, race, or position.
You can create art and beauty on a computer.
Computers can change your life for the better.”
—Steven Levy, U.S. writer. Hackers, ch. 2, The Hacker Ethic, pp. 27-33, Anchor Press, Doubleday (1984)
“Could it not be that just at the moment masculinity has brought us to the brink of nuclear destruction or ecological suicide, women are beginning to rise in response to the Mothers call to save her planet and create instead the next stage of evolution? Can our revolution mean anything else than the reversion of social and economic control to Her representatives among Womankind, and the resumption of Her worship on the face of the Earth? Do we dare demand less?”
—Jane Alpert (b. 1947)