Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Access Controls

Handbook of Research on Information Security and Assurance
Controls that restrict access to your business systems to authorized personnel.
Published in Chapter:
Guarding Corporate Data from Social Engineering Attacks
Christopher M. Botelho (Baylor Health, USA) and Joseph A. Cazier (Appalachian State University, USA)
Copyright: © 2009 |Pages: 10
DOI: 10.4018/978-1-59904-855-0.ch037
Abstract
The threat of social engineering attacks is prevalent in today’s society. Even with the pervasiveness of mass media’s coverage of hackers and security intrusions, the general population is not aware of the possible damage that could occur should they be subjected to a social engineering attack. In order to show the damage caused by these attacks, we will discuss the results of a social engineering attack based on a survey conducted in the downtown area of a large financial center in the United States. The authors make suggestions companies can incorporate into their policies in order to protect their employees, as well as systems from intrusions based on social engineering attacks.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Knowledge Management and Information Technology Security Services
Provide legitimate access to IT systems and deliver information only to authorized users when required without any interruptions.
Full Text Chapter Download: US $37.50 Add to Cart
A Case Study in the Role of Trust in Web Service Securities
Mechanisms that provide authorization mechanisms thereby assuring that Web services transactions are sent and received without interruption.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR