IDEAS home Printed from https://ideas.repec.org/a/bjc/journl/v8y2023i10p91-105.html
   My bibliography  Save this article

Access Control Application Prevention and Mitigation of Cyber Attacks

Author

Listed:
  • Pawandeep Kaur

    (School of Computer Science, Taylor’s University, Subang Jaya, Selangor, Malaysia)

  • Farahlina

    (School of Computer Science, Taylor’s University, Subang Jaya, Selangor, Malaysia)

  • Aftab Alam

    (School of Computer Science, Taylor’s University, Subang Jaya, Selangor, Malaysia)

  • Sukhminder Kaur

    (School of Computer Science, Taylor’s University, Subang Jaya, Selangor, Malaysia)

  • Roheender Singh Sahota

    (School of Technology, Asia Pacific University of Technology & Innovation, Malaysia)

Abstract

In the rapidly evolving landscape of cyber threats, safeguarding digital assets has become paramount for organizations worldwide. This paper presents a comprehensive analysis of access control applications as a frontline defense against cyber intrusions. We delve into the mechanics of contemporary access control systems, highlighting their role in preventing unauthorized access and ensuring data integrity. Drawing on real-world case studies, we demonstrate the efficacy of robust access control measures in thwarting cyber-attacks and mitigating their potential impacts. Further, we explore the challenges faced in implementing these systems, such as ensuring scalability, managing user privileges, and maintaining system resilience. Our findings underscore the indispensable nature of access control applications in today’s digital age. By offering actionable insights and best practices, this paper aims to guide organizations in fortifying their digital infrastructures against the ever-present threat of cyberattacks. To ensure the security of data, it’s essential to update automation processes periodically. This not only safeguards the transfer of information, ensuring its authenticity and confidentiality, but also prevents tampering or misinformation. Incorporating access control into the security strategy can address this concern. Access control restricts data access to designated individuals within the organization. However, there’s an inherent risk: permissions could inadvertently be granted to unintended parties. To mitigate this, we recommend several solutions, with multifactor authentication being a prominent option for future implementation.

Suggested Citation

  • Pawandeep Kaur & Farahlina & Aftab Alam & Sukhminder Kaur & Roheender Singh Sahota, 2023. "Access Control Application Prevention and Mitigation of Cyber Attacks," International Journal of Research and Scientific Innovation, International Journal of Research and Scientific Innovation (IJRSI), vol. 8(10), pages 91-105, October.
  • Handle: RePEc:bjc:journl:v:8:y:2023:i:10:p:91-105
    as

    Download full text from publisher

    File URL: https://www.rsisinternational.org/journals/ijrias/digital-library/volume-8-issue-10/91-105.pdf
    Download Restriction: no

    File URL: https://rsisinternational.org/journals/ijrias/articles/access-control-application-prevention-and-mitigation-of-cyber-attacks/
    Download Restriction: no
    ---><---

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:bjc:journl:v:8:y:2023:i:10:p:91-105. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Dr. Renu Malsaria (email available below). General contact details of provider: https://www.rsisinternational.org/journals/ijrias/ .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.