![cover image](https://wikiwandv2-19431.kxcdn.com/_next/image?url=https://upload.wikimedia.org/wikipedia/commons/thumb/a/aa/-32_Security_system.jpg/640px--32_Security_system.jpg&w=640&q=50)
Access control
Selective restriction of access to a place or other resource, allowing only authorized users / From Wikipedia, the free encyclopedia
For the regulations on roadway access in traffic engineering, see Access management.
In physical security and information security, access control (AC) is the selective restriction of access to a place or other resource, while access management describes the process. The act of accessing may mean consuming, entering, or using. Permission to access a resource is called authorization.
![]() | This article may be too long to read and navigate comfortably. (October 2020) |
![](http://upload.wikimedia.org/wikipedia/commons/thumb/a/aa/-32_Security_system.jpg/640px--32_Security_system.jpg)
![](http://upload.wikimedia.org/wikipedia/commons/thumb/4/42/US_Navy_050308-N-2385R-029_Master-at-Arms_Seaman_Carly_Farmer_checks_an_identification_card_%28ID%29_before_allowing_a_driver_to_enter_the_gate_at_U.S._Fleet_Activities_Sasebo%2C_Japan.jpg/640px-thumbnail.jpg)
Access control on digital platforms is also termed admission control. The protection of external databases is essential to preserve digital security.[1]
Access control is considered to be a significant aspect of privacy that should be further studied. Access control policy (also access policy) is part of an organization’s security policy. In order to verify the access control policy, organizations use an access control model.[2]