1. Prevention of unauthorized use of a resource, including the prevention of use of a resource in an unauthorized manner.
(Source: ISO/IEC 18028-2:2006)
2. Protection of resources against unauthorized access; a process by which use of resources is regulated according to a security policy and is permitted by only authorized system entities according to that policy.
(Source: RFC 2828)
3. Rules and deployment mechanisms which control access to information systems, and physical access to premises. The entire subject of Information Security is based upon Access Control, without which Information Security cannot, by definition, exist.
(Source: ISO/IEC 27002:2005) |