Jump to content

Logical access control

From Wikipedia, the free encyclopedia
This is an old revision of this page, as edited by Ruoyu Xu (talk | contribs) at 16:58, 12 August 2014. The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

Logical access in IT is often defined as interactions with hardware through remote access. Logical access controls are tools used for identification, authentication, authorization, and accountability in computer information systems. In another word, This type of access generally features identification, authentication and authorization protocols. This is often contrasted with the term "physical access," which refers to interactions with hardware in the physical environment, where equipment is stored and used. [1]They are components that enforce access control measures for systems, programs, processes, and information. Logical access controls can be embedded within operating systems, applications, add-on security packages, or database and telecommunication management systems.[2]

Logical access control can be contrasted with physical access control (an example of which is a mechanical lock and key controlling access to a room), but the line between the two can be blurred when physical access is controlled by software. For example, entry to a room may be controlled by a chip and PIN card and an electronic lock controlled by software. Only those in possession of an appropriate card, with an appropriate security level and with knowledge of the PIN are permitted entry to the room. On swiping the card into a card reader and entering the correct PIN, the user's security level is checked against a security database and compared to the security level required to enter the room. If the user meets the security requirements, entry is permitted. Having logical access controlled centrally in software allows a user's physical access permissions to be rapidly amended or revoked.[3]

Logical Controls, also called logical access controls and technical controls, protect data and the systems, networks, and environments that protect them. In order to authenticate, authorize, or maintain accountability a variety of methodologies are used such as password protocols, devices coupled with protocols and software, encryption, firewalls, or other systems that can detect intruders and maintain security, reduce vulnerabilities and protect the data and systems from threats.[4]

Businesses, organizations and other entities use a wide spectrum of logical access controls to protect hardware from unauthorized remote access. These can include sophisticated password programs, advanced biometric security features, or any other setups that effectively identify and screen users at any administrative level. [5]

The particular logical access controls used in a given facility and hardware infrastructure partially depend on the nature of the entity that owns and administrates the hardware setup. Government logical access security is often different from business logical access security, where federal agencies may have specific guidelines for controlling logical access. Users may be required to hold security clearances or go through other screening procedures that complement secure password or biometric functions. This is all part of protecting the data kept on a specific hardware setup. [6]

Militaries and governments use logical access biometrics to protect their large and powerful networks and systems which require very high levels of security. It is essential for the large networks of police forces and militaries where it is used not only to gain access but also in six main essential applications. Without logical access control security systems highly confidential information would be at risk of exposure.[7]

There is a wide range of biometric security devices and software available for different levels of security needs. There are very large complex biometric systems for large networks that require absolute air tight security and there are less expensive systems for use in office buildings and smaller institutions. [8]

Extending Reading-Practical use and Business

Logical access control solutions from ASSA ABLOY brand HID Global enable a wide range of PC and network-related applications ensuring several solutions.[9]

Logical access control involves identification, authentication, authorization and accountability in computer systems. HID Globals solutions ensuring secure authentication and log-in, secure e-mail, data encryption, file encryption, single sign-on and remote VPN access.[10]

By collaborating with IT industry leaders, ASSA ABLOY brand HID Global has complemented its physical access control offerings with an extensive portfolio of logical access offerings enabling a wide range of logical/physical convergence solutions.[11]

Some of HID Global’s logical access solutions include HID on the Desktop, which conveniently improve risk management across an enterprise by using an organization’s physical access control cards to log into the IT infrastructure, Crescendo, a series of highly secure multi-technology smart cards built to provide standards-compliant support for existing physical and logical access applications and OMNIKEY readers for PC logical access.[12]

Notes

  1. ^ Cory Janssen
  2. ^ Andress, Jason. 2011
  3. ^ Andress, Jason. 2011
  4. ^ Andress, Jason. 2011
  5. ^ Cory Janssen
  6. ^ Cory Janssen
  7. ^ findBIOMETRICS
  8. ^ findBIOMETRICS
  9. ^ assaabloy.
  10. ^ assaabloy.
  11. ^ assaabloy.
  12. ^ assaabloy.

References

Andress, Jason. (2011). ″The Basics of Information Security.″

Cory Janssen, Logical Access, Techopedia, retrieved at 3:15 a.m. on August 12th 2014

findBIOMETRICS, Logical Access Control Biometrics, retrieved at 3:25 a.m. on August 12th 2014

assaabloy, ″Logical access control″, retrieved at 12:55 p.m. on August 12th 2014