Logical Access in computer security it is often defined as interactions with hardware through remote access. This type of access generally features identification, authentication and authorization protocols. Logical access is often needed for remote access of hardware and is often contrasted with the term “physical access“, which refers to interactions (such as a lock and key) with hardware in the physical environment, where equipment is stored and used. Businesses, organizations and other entities use a wide spectrum of logical access controls to protect hardware from unauthorized remote access. These can include sophisticated password programs, secure smart cards or tokens, advanced biometric security features, or any other setups that effectively identify and screen users at any administrative level. Government logical access security is often different from business logical access security, where federal agencies may have specific guidelines for controlling logical access. Users may be required to hold security clearances or go through other screening procedures that complement secure password or biometric functions. This is all part of protecting the data kept on a specific hardware setup.

Related Articles

EyeLock Combines Physical and Logical Biometric Access Control in the Latest Version of Its Identity Management Application

January 13th, 2021|

NEW YORK, Jan. 13, 2021 /PRNewswire/ -- EyeLock LLC, the leader of iris-based identity authentication solutions, announced today that the latest release of its identity management software application, EyeLock Identity Suite (EIS), now supports highly secure physical and logical access control in a

SmartMetric Enters $14.82 Billion Security Card Market With A World First Super Thin Biometric Multi-Function All In One Logical Access, Physical Access & ID Fingerprint Validated and Activated Security Card

June 8th, 2018|

NEW YORK, June 08, 2018 (GLOBE NEWSWIRE) -- SmartMetric, Inc. (OTCQB:SMME) - SmartMetric has created an advanced biometric card that combines cyber security for network logon along with building and doorway access and security desk identification in a single credit

Related Products

« Back to Glossary Index