ACCESS CONTROL
                    BY:
               M.Vinay kumar




Department of Urban and Regional Planning,
School of Planning and Architecture,
Jawaharlal Nehru Technological University,
Hyderabad.
What is access
control….? control refers to exerting
      Access
control over who can interact with a resource.
Often but not always, this involves an authority,
who does the controlling.
              It be a door, turnstile, parking gate,
elevator, or other physical barrier where
granting access can be electronically
controlled.
AC- How do it secure us…
   Authentication
      Process through which one proves and verifies certain
       information
   Identification
      Process through which one ascertains the identity of
       another person or entity
   Confidentiality
      Protection of private data from unauthorized viewing
   Integrity
      Data is not corrupted or modified in any unauthorized
       manner
How can AC be implemented?
  Hardware

  Software
   Application
   Protocol   (Kerberos, IPSec)
  Physical

  Logical   (policies)
Types of Access control…
   Physical access Security

   Computerized access control
Physical access…
    Access control system operation
    Credential
    Access control system components
    Access control topology
    Types of readers
         Basic (non-intelligent) readers
         Semi-intelligent readers
         Intelligent readers
    Security risks
Computerized access…
    Identification and authentication (I&A)
       Something you know
       Something you have
       Something you are
       Where you are
    Authorization
       Read (R)
        Write (W)
        Execute (X)
Contd…
   Accountability
   Access control models
   Attribute-based access control
   Discretionary access control
   Mandatory access control
   Role-based access control

More Related Content

PPTX
Access control
PDF
Multi Factor Authentication
PPT
Overview
PDF
Access Control Presentation
PPTX
Mit project
PDF
Chapter 3 security principals
PDF
Access_Control_Systems_and_methodology
PPT
Eds user authenticationuser authentication methods
Access control
Multi Factor Authentication
Overview
Access Control Presentation
Mit project
Chapter 3 security principals
Access_Control_Systems_and_methodology
Eds user authenticationuser authentication methods

Viewers also liked (20)

PDF
Green Buildings
PPT
Hybrid Energy Systems
PDF
PPT
Non Destructive Testing Of Materials
PDF
Business Case for Green Buildings
PDF
PDF
PPTX
Green buildings matter
PPTX
TERI-The Energy And Resource Institute
PPSX
Mpls library-greenroof
PPT
Brightech Conference Room Design Build Project
PPTX
Loren Abraham Selected Product Development
PPSX
Loren abraham selected work
PPTX
Presentation11
PPSX
St. Paul Fire Station Green Roof Intrpretive Center and Garden Classroom
PDF
St. Paul Fire Station Green Roof Plant Pallettes
PPT
It parks
PPSX
Daylighting Analysis of Electrochromic switchable glazing compared to convent...
PPTX
Contoh Slide
Green Buildings
Hybrid Energy Systems
Non Destructive Testing Of Materials
Business Case for Green Buildings
Green buildings matter
TERI-The Energy And Resource Institute
Mpls library-greenroof
Brightech Conference Room Design Build Project
Loren Abraham Selected Product Development
Loren abraham selected work
Presentation11
St. Paul Fire Station Green Roof Intrpretive Center and Garden Classroom
St. Paul Fire Station Green Roof Plant Pallettes
It parks
Daylighting Analysis of Electrochromic switchable glazing compared to convent...
Contoh Slide
Ad

Similar to Access control by vinay (20)

PPT
Chapter006
PPTX
001 Intro Foundations of Information Security.
PPTX
Unit-I PPT.pptx
DOCX
Access control
PPSX
Securing The Workplace Presentation From American Barcode And Rfid
PPTX
Access Control in internet and computer science.pptx
PPTX
ClearPass_Customer_Presentation
PPT
Software Security Testing
DOCX
Access Control Domain Access Control Lists (AC.docx
PPT
003 Security Mechanisms and other relevant
PPT
003 Security Mechanisms and other things with
PPTX
information security technology
PPTX
COMPUTER SECURITY in Information Security
PDF
What is Authentication vs Authorization Difference? | INTROSERV
PPTX
cyber secuirty.pptx
PDF
Implementing Physical Security As An Access Control Plan
PPTX
Ethical hacking11601031 (1)
PPTX
Introduction to information security
PPSX
Intrusion detection system
PPTX
Intro Foundations of Information Security.pptx
Chapter006
001 Intro Foundations of Information Security.
Unit-I PPT.pptx
Access control
Securing The Workplace Presentation From American Barcode And Rfid
Access Control in internet and computer science.pptx
ClearPass_Customer_Presentation
Software Security Testing
Access Control Domain Access Control Lists (AC.docx
003 Security Mechanisms and other relevant
003 Security Mechanisms and other things with
information security technology
COMPUTER SECURITY in Information Security
What is Authentication vs Authorization Difference? | INTROSERV
cyber secuirty.pptx
Implementing Physical Security As An Access Control Plan
Ethical hacking11601031 (1)
Introduction to information security
Intrusion detection system
Intro Foundations of Information Security.pptx
Ad

Recently uploaded (20)

DOCX
ola and uber project work (Recovered).docx
PDF
Pink Cute Simple Group Project Presentation.pdf
PDF
the role of manager in strategic alliances
PPTX
Transportation in Logistics management.pptx
PPTX
interschool scomp.pptxzdkjhdjvdjvdjdhjhieij
PDF
Robin Fischer: A Visionary Leader Making a Difference in Healthcare, One Day ...
PPTX
IMM.pptx marketing communication givguhfh thfyu
PPTX
CTG - Business Update 2Q2025 & 6M2025.pptx
PDF
Second Hand Fashion Call to Action March 2025
DOCX
Center Enamel Powering Innovation and Resilience in the Italian Chemical Indu...
PPTX
IMM marketing mix of four ps give fjcb jjb
PDF
Highest-Paid CEO in 2025_ You Won’t Believe Who Tops the List.pdf
PDF
Immigration Law and Communication: Challenges and Solutions {www.kiu.ac.ug)
PPTX
Market and Demand Analysis.pptx for Management students
DOCX
Handbook of Entrepreneurship- Chapter 5: Identifying business opportunity.docx
PDF
533158074-Saudi-Arabia-Companies-List-Contact.pdf
DOCX
80 DE ÔN VÀO 10 NĂM 2023vhkkkjjhhhhjjjj
PDF
Business Communication for MBA Students.
PDF
757557697-CERTIKIT-ISO22301-Implementation-Guide-v6.pdf
PDF
Value-based IP Management at Siemens: A Cross-Divisional Analysis
ola and uber project work (Recovered).docx
Pink Cute Simple Group Project Presentation.pdf
the role of manager in strategic alliances
Transportation in Logistics management.pptx
interschool scomp.pptxzdkjhdjvdjvdjdhjhieij
Robin Fischer: A Visionary Leader Making a Difference in Healthcare, One Day ...
IMM.pptx marketing communication givguhfh thfyu
CTG - Business Update 2Q2025 & 6M2025.pptx
Second Hand Fashion Call to Action March 2025
Center Enamel Powering Innovation and Resilience in the Italian Chemical Indu...
IMM marketing mix of four ps give fjcb jjb
Highest-Paid CEO in 2025_ You Won’t Believe Who Tops the List.pdf
Immigration Law and Communication: Challenges and Solutions {www.kiu.ac.ug)
Market and Demand Analysis.pptx for Management students
Handbook of Entrepreneurship- Chapter 5: Identifying business opportunity.docx
533158074-Saudi-Arabia-Companies-List-Contact.pdf
80 DE ÔN VÀO 10 NĂM 2023vhkkkjjhhhhjjjj
Business Communication for MBA Students.
757557697-CERTIKIT-ISO22301-Implementation-Guide-v6.pdf
Value-based IP Management at Siemens: A Cross-Divisional Analysis

Access control by vinay

  • 1. ACCESS CONTROL BY: M.Vinay kumar Department of Urban and Regional Planning, School of Planning and Architecture, Jawaharlal Nehru Technological University, Hyderabad.
  • 2. What is access control….? control refers to exerting Access control over who can interact with a resource. Often but not always, this involves an authority, who does the controlling. It be a door, turnstile, parking gate, elevator, or other physical barrier where granting access can be electronically controlled.
  • 3. AC- How do it secure us…  Authentication  Process through which one proves and verifies certain information  Identification  Process through which one ascertains the identity of another person or entity  Confidentiality  Protection of private data from unauthorized viewing  Integrity  Data is not corrupted or modified in any unauthorized manner
  • 4. How can AC be implemented?  Hardware  Software  Application  Protocol (Kerberos, IPSec)  Physical  Logical (policies)
  • 5. Types of Access control…  Physical access Security  Computerized access control
  • 6. Physical access…  Access control system operation  Credential  Access control system components  Access control topology  Types of readers Basic (non-intelligent) readers Semi-intelligent readers Intelligent readers  Security risks
  • 7. Computerized access…  Identification and authentication (I&A) Something you know Something you have Something you are Where you are  Authorization Read (R) Write (W) Execute (X)
  • 8. Contd…  Accountability  Access control models  Attribute-based access control  Discretionary access control  Mandatory access control  Role-based access control