Computer Access Control

Various means have been devised to give access to authorized people.
These means fall into four broad categories.

1)  ID card or key 
2) Password or ID number 
3) Sign document 
4)  Biometrics. 

ID card or key :  

The user may have a key, badge, token, or plastic card to give inn or her physical access to the computer room or a locked up terminal. A card with a magnetized strip, for example, can give the user access to the bank account via a remote cash machine. Taking a step further, some employees begin each business day by donning an active badge, a clip-on identification card with an embedded computer chip. The active badge, which is becoming increasingly common, presents a challenging problem : balancing an employees privacy against a corporations desire for efficiency and control.

Password and ID number

Standard items are system password or identification number for bank cash machine. Cipher looks on doors require that a user knows the correct combination of numbers.
Sign document : Sign documents provide identification of a person. Though a signatures lend themselves to human interaction better than machine interaction.

Biometrics :

Some security systems use biometric devices which identify a person through finger print, voice intonation or other biological characteristics. Even newer is the concept of identification by the retina of the eye, which has a pattern that is harder to duplicate. Some systems use a combination of the preceding categories. For example, access to an automated teller machine requires both something like a plastic card and a personal identification number (PIN)