Organizations must limit information system access to authorized users, processes acting on behalf of authorized users or devices (including other information systems), and to the types of transactions and functions that authorized users are permitted to exercise. Also called AC
A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
This WikiMD article Access control is a stub.
If you are a subject matter expert or authority on Access control, you can help us.
About | Mission | Paid editors welcome. WikiMD needs you!
Access control is part of WikiMD's free ^articles!
^Access control (article) is provided for informational purposes only. No expressed or implied warranties as to the validity of content.
Templates etc. when imported from Wikipedia, are licensed under CC BY-SA 3.0. See full disclaimers.