Access

1. In IT security, access refers to the permissions a user, program, or device has to interact with data, content, and/or other devices. Access can be granular, such as the ability to view, share or print a specific file, or it can be broad, such as admittance to a computer s operating system to use its installed applications.

At the file level, access can be customized to enable a unique combination of privileges. For example, access can be restricted to read-only, meaning a user, program, or device can view a file but cannot modify or delete it. Or, access can allow some files to be created, edited, or deleted, but restricts that functionality for more sensitive files. This type of access is particularly important in the context of digital rights management (DRM), a system for protecting intellectual property and data copyright. As a response to the rise of Internet piracy, DRM allows for widespread (or limited) access to a digital file while also preventing unauthorized duplication or reproduction.

When applied to storage, access refers to the act of reading data from or writing data to a mass storage device. For example, programs can access a computer s memory, which means they read data from or write data to the main memory but do not interact with it otherwise. The time it takes to locate a single byte of information on a mass storage device is called the access time.

In web development, access characterizes which pages of a website are visible on the Internet and which users can view or modify them. If a web page is still in production, the draft will be hidden from the public but still accessible to anyone who has login credentials with the right privileges. Access levels can also be useful when gating content or building a community site in which someone must become a member to gain access.

With computers and servers, administrator access (also called root-level access) typically offers complete visibility and control over all aspects of a computer or network, as well as the access privileges other users have. This type of access enables administrators to install and configure applications and software.

2. When capitalized, Access refers to Microsoft Access.

Vangie Beal
Vangie Beal
Vangie Beal is a freelance business and technology writer covering Internet technologies and online business since the late '90s.

Related Articles

ScalaHosting

ScalaHosting is a leading managed hosting provider that offers secure, scalable, and affordable cloud VPS solutions for businesses. It claims to change the status...

Data Visualization

Data visualization is the graphic representation of data so that analysts, readers, clients, and stakeholders can more easily see the implications of the raw...

RSA SecurID

RSA SecurID is multi-factor authentication (MFA) technology used to protect network resources, such as applications and websites. Its purpose is to mitigate risk and...

Logo

A logo is a symbol, mark, or other visual element that a company uses in place of or in conjunction with its business title....

ScalaHosting

ScalaHosting is a leading managed hosting provider that offers secure, scalable, and affordable...

HRIS

Human resources information system (HRIS) solutions help businesses manage multiple facets of their...

Best Managed Service Providers...

In today's business world, managed services are more critical than ever. They can...