In: Nursing
What kinds of access control models are most central to securing critical health data?
Ans) Access control:
- In the fields of physical security and information security, access control is the selective restriction of access to a place or other resource while access management describes the process. The act of accessing may mean consuming, entering, or using. Permission to access a resource is called authorization.
4 Types of access control:
- Older access models include discretionary access control (DAC)
and mandatory access control (MAC), role based access control
(RBAC) is the most common model today, and the most recent model is
known as attribute based access control (ABAC).
Benefits:
- Keep Track of Employees:
If a business has multiple shifts with large groups of employees
coming and going at odd hours, an Access Control System can help
organize the chaos and inform you if an employee is in the building
when they shouldn’t be. It can also help you keep track of who has
shown up for work and who hasn’t.
- Secure Sensitive Documents and Data:
Many businesses have documents or data that should not be
accessible to everyone in the company. An access control system
allows a business to limit the access to certain areas that hold
hardware or software that this information is saved on.
- Reduce Theft and Accidents:
An Access Control System allows a business to give only approved or
specially trained employees access to areas that may hold valuable
or dangerous equipment.
- Multi-Property Protection:
An integrated access control system will allow a business to grant
access to employees who need to enter multiple or all
buildings.
- No More Worrying About Keys:
When an employee quits and fails to return their keys, the business
is stuck with the expense of making new keys and possibly even
changing the locks. The same would apply when an employee loses his
or her company keys. If the employee left on bad terms, this also
removes the chance that they will try to re-enter the building and
do damage.
With an access aontrol system, the business can just remove the employee’s access from the system digitally.
How Access Control Works:
- Access control readers give access to the building based on
established credentials. Things like a key card, key fob, or
biometrics like fingerprints are all considered established
credentials.
- Door readers are connected to a network. -Every person who needs
access has a code tied to their credential and the system
recognizes that they are authorized to be in the building.
- Software tracks who enters and exits the building and has the
ability to alert security supervisors, business owners, etc. when
someone enters the building after hours or there is a break-in.