Access

1. In IT security, access refers to the permissions a user, program, or device has to interact with data, content, and/or other devices. Access can be granular, such as the ability to view, share or print a specific file, or it can be broad, such as admittance to a computer s operating system to use its installed applications.

At the file level, access can be customized to enable a unique combination of privileges. For example, access can be restricted to read-only, meaning a user, program, or device can view a file but cannot modify or delete it. Or, access can allow some files to be created, edited, or deleted, but restricts that functionality for more sensitive files. This type of access is particularly important in the context of digital rights management (DRM), a system for protecting intellectual property and data copyright. As a response to the rise of Internet piracy, DRM allows for widespread (or limited) access to a digital file while also preventing unauthorized duplication or reproduction.

When applied to storage, access refers to the act of reading data from or writing data to a mass storage device. For example, programs can access a computer s memory, which means they read data from or write data to the main memory but do not interact with it otherwise. The time it takes to locate a single byte of information on a mass storage device is called the access time.

In web development, access characterizes which pages of a website are visible on the Internet and which users can view or modify them. If a web page is still in production, the draft will be hidden from the public but still accessible to anyone who has login credentials with the right privileges. Access levels can also be useful when gating content or building a community site in which someone must become a member to gain access.

With computers and servers, administrator access (also called root-level access) typically offers complete visibility and control over all aspects of a computer or network, as well as the access privileges other users have. This type of access enables administrators to install and configure applications and software.

2. When capitalized, Access refers to Microsoft Access.

Vangie Beal
Vangie Beal
Vangie Beal is a freelance business and technology writer covering Internet technologies and online business since the late '90s.

Related Articles

Human Resources Management System

A Human Resources Management System (HRMS) is a software application that supports many functions of a company's Human Resources department, including benefits administration, payroll,...

How To Defend Yourself Against Identity Theft

Almost every worldwide government agency responsible for identity theft issues will tell you the same thing: The first step to fighting identity theft is...

Infographic

An infographic is a visual representation of information or data. It combines the words information and graphic and includes a collection of imagery, charts,...

Phishing

What is phishing? Phishing is a type of cybercrime in which victims are contacted by email, telephone, or text message by an attacker posing as...

ScalaHosting

ScalaHosting is a leading managed hosting provider that offers secure, scalable, and affordable...

HRIS

Human resources information system (HRIS) solutions help businesses manage multiple facets of their...

Best Managed Service Providers...

In today's business world, managed services are more critical than ever. They can...