Download full paperFile format: .doc, available for editing

It is a critical responsibility of management to ensure that organizational information and information systems are adequately secured. Almost all applications dealing with privacy and financial have some kind of access control. Indeed, access control entails verifying the permitted activities of legitimate users through mediation of their every attempt they conduct in accessing a resource in the system (Hu, Ferraiolo, & Kuhn, 2006). The user can be granted complete access by the system after successful authentication but majority of the systems demands a more complicated control. Access control also involves the manner in which authorizations are structured (Tistarelli & Nixon, 2009).

Authorization may be based on the sensitive nature of information which requires clearance before a user can access the documents. In some cases, it is a reflection of organizational structure. This essay discusses aspects of access control technology (ACS) by focusing on ACS technology trends and future directions. Biometrics access control system is also discussed in detail. Access control industry continues to evolve with introduction of adaptable, secure, and open security solutions. Static access control architectures that have shaped the industry for a long time are becoming redundant as organizations require access control solutions that are capable of adapting to future threats (Le & Jain, 2009).

Indications about future trends in ACS technology shows that secure print management and network logon would be achieved. This objective is critical as technological trend moves towards adoption of fully interoperable, multilayered access control security systems. Incorporation of dynamic technologies has become a major requirement in ACS technology sector. This ensures that security is independent of hardware and media (Ferraiolo, Kuhn, & Chandramouli, 2007).

Access control infrastructure can therefore evolve to meet future demands and security threats beyond the current capabilities. Additionally, it will be adaptable to deal with continuously changing threats. However, access control industry is still at an early stage regarding this development as many organisations are reluctant to embrace this change. In addition, more adoption of dynamic access control security solutions are expected to increase as strategies for change will become more understandable and opportunities for change are embraced. It is vital to put mechanisms in place that properly authenticates authorized users only to access data through access control by blocking attackers or unwanted guests pretending to be legitimate users.

Here, access control can be considered to be a security element and a solid background used to implement further security measures (Poniszewska-Maranda & Rutkowska, 201). Through access control system, an organization should first control unauthorized use of its data and resources. The focus should then shift to prevention of any kind of intrusions from outside (Kims & Solomon, 2012). Indeed, the logic behind access control involves restricting and protecting access to some resource and ensuring only those permitted do actually access it.

Access control system also deals with the manner and time in which a resource can be used (). Kims & Solomon, 2012). An example is an operating system responsible for controlling access to the files and a certain authorized user only has access to edit a given file during normal working hours. In essence, proper management of access control systems technologies appropriately promotes sharing of information amongst users and applications (Betino, Chinua, & Kamra, 2011).

Download full paperFile format: .doc, available for editing
Contact Us