Get premium membership and access questions with answers, video lessons as well as revision papers.

Access control is the restriction of unauthorized access to a portion of a computer system or the entire system.Required: (a) Explain the following control techniques and...

      

Access control is the restriction of unauthorised access to a portion of a computer system or the
entire system.
Required:
a) Explain the following control techniques and their significance in the context of data security.
i) Biometric control
ii) Encryption
iii) Logical access

  

Answers


gregory
Control techniques and their significance in the context of data security.
i) Biometrics control
These are controls that involve a high level of technology whereby the system identifies a user
by recognising his biological characteristics. The most commonly available systems are voice
recognition systems which are able to recognise the user‘s voice and thus allow him access to
the system. Also, biometrics systems are available which are able to recognise a user‘s eyes.
A system user needs only to focus his or her eyes before abeam of light which is displayed by
the system input machine which then sends signals to the processor the user authentication.
This form of control is important to data security that: -
1. It is accurate and cannot be forged by unauthorised users.
2. It is a fast way since keying of data is required.
ii) Encryption
This is a control technique which involves scrambling the data at one end of the line,
transmitting the scrambled data and unscrambling it at the at the receiver‘s end of the line.
Scrambling refers to transformation of data into codes and characters that cannot be read by
an ordinary person. Data encryption is a way of preventing electronic eavesdropping or wire-
tapping.
Encryption ensures data integrity which means that data is preserved in the same status as in
the source document and has not been accidentally or incidentally destroyed or disclosed.
It also ensures privacy over data is maintained and individuals are assured of the control and
use of their own information.
iii) Logical access
This refers to controlling those who have access to the terminal of a computer from gaining
access to the data of a software. They are also known as data controls. They ensure that:
- Data is collected in full and with accuracy -
Data is held up to date
- Data is processed in the right way to produce the required report. -
Reports are generated at the required time.
Some examples of logical access controls include:
1. Password: - This is a set of characters, which may be allocated to a person, terminal,
orfacility and which must be keyed in before access is permitted. It is used to identify the
user and check the user authority.
2. Personal identification numbers (PIN). This refers to a set of characters which
mustbe keyed in to the system to allow further access to the system. They are allocated to
each individual user of the system.
gregorymasila answered the question on November 29, 2017 at 09:25


Next: Application controls can be classified into three major categories, processing controls and output controls. Describe the objective of each control and examine the techniques within...
Previous: Why is Indonesia the current threat to volcanic eruptions?

View More Computer Science Questions and Answers | Return to Questions Index


Learn High School English on YouTube

Related Questions