Skip to main content
Generic filters
Search in title
Search in content
Search in excerpt

Access Control

Access control in computer systems is a behind-the-scenes security process that manages who or what can view, use, or manage resources in a computing environment.

It is a vital component of data security and helps protect sensitive information from unauthorized access while ensuring that legitimate users can access the necessary resources.

There are different ways of organizing Access Control. For example, in some systems, each user can control who has access to their files, known as Discretionary Access Control (DAC). On the other hand, some systems have central rules that determine who can access what resources, which is called Mandatory Access Control (MAC).

Organizing Access

Many systems use Role-Based Access Control (RBAC) that gives permissions based on the user’s role. It’s like a chef having access to the kitchen and a librarian having access to the library.

Lastly, Attribute-Based Access Control (ABAC) is a more complex method that allows specific attributes or characteristics to dictate access.

It is essential to select the correct type of access control model based on the organization’s needs and nature and implement it properly to ensure the confidentiality, integrity, and availability of the system’s resources.


Regardless of the method used, access control aims to protect sensitive information from unauthorized access while allowing authorized users to access the programs and data they need to do their jobs effectively and efficiently.

Access Control approaches – 6 mins

YouTube player