Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Access Management

Handbook of Research on Technology Integration in the Global World
Activities organizations carry out to control users' access to computer systems, networks, and facilities (buildings, rooms, workspaces). It also includes the tasks users are permitted to perform when access is granted.
Published in Chapter:
Conceptualizing the Domain and an Empirical Analysis of Operations Security Management
Winfred Yaokumah (Pentecost University College, Ghana)
Copyright: © 2019 |Pages: 27
DOI: 10.4018/978-1-5225-6367-9.ch015
Abstract
Operations security management integrates the activities of all the information systems security controls. It ensures that the entire computing environment is adequately secured. This chapter conducts an in-depth review of scholarly and practitioner works to conceptualize the domain of operations security management. Drawing upon the existing information systems security literature, the chapter classifies operations security management into 10 domains. Following, the chapter performs an empirical analysis to investigate the state-of-practice of operations security management in organizations. The findings show that the maturity level of operations security management is at the Level 3 (well-defined). The maturity levels range from Level 0 (not performed) to Level 5 (continuously improving). The results indicate that operations security processes are documented, approved, and implemented organization-wide. Backup and malware management are the most applied operations security controls, while logging, auditing, monitoring, and reviewing are the least implemented controls.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Cloud Security Risks, Threats, and Solutions for Business Logistics
Access management, often referred to as identity and access management (IAM), is the practice of controlling and managing user access to computer systems, networks, and data. In the context of cloud computing, access management involves defining and enforcing access policies, permissions, and roles to ensure that users have appropriate levels of access to cloud resources based on their roles and responsibilities.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR