Access Control Types

Begin Learning Cyber Security for FREE Now!

Already a Member Login Here

Access Control Types:

The three types of access control offer different levels of protection, and each can be configured based on the needs of the organization. This affords the security administrator extensive discretionary control over security mechanisms and reinforces the organization’s security as a whole.

The main objective of security control mechanisms is to prevent, identify, or recover from problems. Preventive controls are used to impede breaches of security or invasive attacks on the system. Detective controls scan the system for harmful agents; and corrective controls repair the systems from damaging attacks.

To apply these measures, controls can be administrative, technical, and physical.

  • Administrative controls are the rules and procedures implemented by the organization. Security awareness training, password administration, background checks are preventive administrative controls.
  • Technical controls are instrumental in protecting the IT infrastructure. These include the restriction of access to systems through user authentication, network segmentation, and protecting information through encryption and antivirus programs.
  • Physical controls protect organizations against theft, loss, and unauthorized access. These include: alarm systems, gated entries, locks, guard dogs, video monitoring systems; the securing of computer equipment; management of cabling infrastructure.

Preventive and detective control types can be integrated with administrative, technical and physical applications to create the following pairings:


View Topics

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?