Trusted answers to developer questions
Trusted Answers to Developer Questions

Related Tags


What is access control in network security?

Hifza Sohail

Network security is a domain that defines solutions for software and hardware linked to access controls, threat protection, and networking rules.

Network security is an essential component when information technology is concerned.

Why is there a need for network security?

It is vital that you protect against data breaches as data leaks can cause severe harm. An organization is unlikely to suffer costly data loss if a network security system is well-maintained.

Types of losses

These costly losses include:

  • A virus that may enter if an unauthentic file is downloaded. The virus replicates itself, maneuvers data from the files in the computer with its own, and corrupts the files.

  • Spyware may enter, if an unauthorized link is accessed, and send the information to a third party.

There are many types of protections to secure the network and prevent losses. They include Access Control, Firewall, Anti-virus, VPNVirtual Private Network, IPSIntrusion Prevention System, etc.

Access control

With access control, user access to your network applications is controlled and unauthorized entries are denied.

An access control system aims to control who has access to a network. We can achieve this by assigning roles to users. Every user may be able to access links to view or perform functions, but not links that contain secure information unrelated to their role.

Apart from providing access based on roles, access can be controlled logically by deploying multiple firewalls. This is known as Network Boundary Protection.

Types of access control

  • Attribute-Based Access Control (ABAC)

    Access is granted based on certain attributes. These attributes might contain the user’s face scan, location, time, etc. The system identifies the familiarity of the provided attributes and grants access accordingly.

  • Role-Based Access Control (RBAC)

    This access is granted on the basis of roles, and not on the basis of user accounts. Individuals only have access to the data they need to work on in order to reduce data breaching in an organization.

  • Mandatory Access Control (MAC)

    This control is used in systems where the data needs to be really secure and the organization cannot afford to lose even the slightest part. A hierarchical approach is used for access control.

    No user can define the security level; only the system administrator can. The security labels are on the basis of classificationlow, medium, high and categorythe area a particular user is going to work on.

    MAC is the most secure of the access control types.



View all Courses

Keep Exploring