Wiki Education Foundation-supported course assignment

edit

  This article was the subject of a Wiki Education Foundation-supported course assignment, between 17 May 2021 and 31 July 2021. Further details are available on the course page. Student editor(s): Fconteh02. Peer reviewers: Jonpcoombes.

Above undated message substituted from Template:Dashboard.wikiedu.org assignment by PrimeBOT (talk) 13:18, 16 January 2022 (UTC)Reply

Split into multiple articles?

edit

I'm concerned that while physical and IT access control have similarities, they are very different domains. It's ok at a high-level, but once the article goes into specifics, the jump between the main sections is quite substantial. Anyone know the best way to reorganize this topic? — Preceding unsigned comment added by Zippydo121 (talkcontribs) 14:52, 26 October 2020 (UTC)Reply

I agree, I suggest sub paragraphs with "see main topic". Kerbless (talk) 15:32, 6 February 2023 (UTC)Reply

This might be useful

edit

Information security#Access control Kerbless (talk) 15:31, 6 February 2023 (UTC)Reply

Semi-protected edit request on 31 August 2024

edit

Access control is considered to be a significant aspect of privacy that should be further studied. Access control policy (also access policy) is part of an organization’s security policy. In order to verify the access control policy, organizations use an access control model.[1] Access control devices such as electronic locks can be more secure than traditional locks as they require authorized credentials, such as PIN codes or access cards, for entry. Shital12T (talk) 17:39, 31 August 2024 (UTC)Reply

  Done - Emphasized security of EAC via use of authorized credentials here, added ref to Further reading here as it didn't bare much on the first claim but is a solid survey of IoT AC. Tule-hog (talk) 23:37, 4 September 2024 (UTC)Reply

References

  1. ^ Ouaddah, Aafaf; Mousannif, Hajar; Abou Elkalam, Anas; Ait Ouahman, Abdellah (2017-01-15). "Access control in the Internet of Things: Big challenges and new opportunities". Computer Networks. 112: 237–262. doi:10.1016/j.comnet.2016.11.007. ISSN 1389-1286.