Access Control Fundamentals

In information security, access control is imperative to ensure confidentiality, integrity, and availability. Controlling who has access to a system and the breadth of access a user has is vital to ensure the security of systems and data on the systems. Read this article to understand the terms access control, access, subject, and resource. Note the challenges, the principles, the criteria, and the practices used in access control.

13. Access Control Techniques

13.5. Context Dependent Access Control

  • The access decisions are based on the context of a collection of information rather than on the sensitivity of the data.
  • Example: A firewall makes a context-based access decisions when they collect state information on a packet before allowing it into the network.