Читать книгу The Internet of Medical Things (IoMT) - Группа авторов - Страница 58

2.4.1 Access Control

Оглавление

The aim of the access control is to provide access only to those who are authorized to be in a building or workplace. Together with the matching metal key, the deadbolt lock was the gold standard of access control for many years, but modern enterprises want more. Yes, you want to check who is passing through your doors, but you also want to monitor and manage access. Keys now have passed the baton to computer based electronic access control systems that give authorized users fast and comfortable access and prohibit access to unauthorized persons.

Today, we carry access cards or ID badges to secure places instead of keys. Access control systems may also be utilized in order to restrict access to workstations and file rooms containing sensitive information, printers, and portals. In bigger buildings, entrance to the external door is typically managed by a tenant or managing agency, but access to the internal office door is controlled by the tenant.

Frequency of access: Frequency of Access control is a fundamental component of data security that dictates who‘s allowed to access and use


Figure 2.2 Data classification in cloud computing. company information and resources. Through authentication and authorization, access control policies make sure users are who they say they are and that they have appropriate access to company data.

Frequency of update: Update will update the data to be duplicated. Is it a low, medium, or result?

Visibility and accessibility: The ability of one entity to “see” (i.e., have direct access to) another.

A related concept: The lexical scope of a name binding is the part of the source code in which the name can refer to the entity

Retention: Data retention, or record retention, is exactly what it sounds like—the practice of storing and managing data and records for a designated period of time. There are many reasons why a business might need to retain data: to maintain accurate financial records; to abide by local, state, and federal laws; to comply with industry regulations; to ensure that information is easily accessible for eDiscovery and litigation purposes; and so on. To fulfill these and other business requirements, it is imperative that every organization develops and implements data retention policies.

The Internet of Medical Things (IoMT)

Подняться наверх