Integrating Technology Into Classrooms for Children and Adult Learners
About Me
Integrating Technology Into Classrooms for Children and Adult Learners

My name is Katie, and I love technology. For years, I worked in a child care centre, and now, I volunteer in an adult literacy classroom. In both of thee situations, I have been impressed by the use of technology. I have seen it integrated in a lot of useful and surprising ways. If you want to use technology in any classroom, my blog will help you generate ideas and learn how to use them effectively. I have three kids, but they are all grown, leaving me with ample time to write. Please, get comfortable and explore these posts. Thanks for finding my blog!

Tags

Integrating Technology Into Classrooms for Children and Adult Learners

What is Integrity Access Control?

Marcia Wagner

In today's world, everything has been digitalized, from buying food to building security. In these times, securing data and information has become crucial. For the sake of security of information technology, access control security technology is used. Access control systems monitor and minimize the risks of security breaches. They ensure the safety and reliability of any business by securing sensitive information and reducing privacy violations.

What is access control?

Access control is an IT security technique, which controls restriction or permission to see and use data or resources. The three fundamentals of access control systems include confidentiality, integrity, and availability. This is called the CIA triad. 

  1. Confidentiality is the protection of information from unauthorized view. The confidentiality threats could be password stealing, credit card information leakage, etc.
  2. Integrity is the protection of information and resources from disclosure, alteration, and destruction. The information could be stored on the devices or transmitted over the network. There are two types of integrity: data integrity, which prevents unauthorized modification to data, and system integrity, which prevents unauthorized access.
  3. Availability ensures that information and resources are available to use when needed.

There are two types of access control.

  1.  Physical Access Control: Limited access to a particular location.
  2.  Logical Access control: Limited access to view and use data and connection of networks. 

Components of Access Control Systems:

To ensure complete security, access control systems must perform identification, authentication and authorization of any access to sensitive data or resource. 

  1. Identification: It is the claim of being the legal or authorized user. For example, if a person claims to be a bank manager, then they must have some sort of identification, like ID cards.
  2. Authentication: It is the validation of the identity claim. For example, fingerprint scans, face mapping etc.
  3. Authorization: It is the permission granted to have access to something. For example, bank clients are provided with a user account or password. This allows them to use specific information and make changes to it.

Types of Access Control Systems

Depending upon the data and its sensitivity, there are four different types of access controls. 

  • Discretionary Access Control (DAC)
  • Managed Access Control (MAC)
  • Role-Based Access Control (RBAC)
  • Attribute-based access control (ABAC)

It is clear why access control is important to modern businesses, especially those that house information digitally or in large office spaces. Integrity access control is particularly important, as this provides customers with a sense of safety when it comes to their information and data.


Share