This report delves into the multifaceted realm of cyber security, with a specific focus on access control mechanisms within organizations. It begins with an introduction to the core concepts of cyber security, defining it as the protection of digital systems and data from malicious attacks, and outlining the scope of the research, including its aims, objectives, and background. A comprehensive literature review then explores the key components of cyber security, such as people, processes, and technology, and categorizes various types of cyber security management, including network, application, and information security, as well as disaster recovery and end-user education. The review also examines different types of cyber threats, including malware, SQL injection, phishing, and denial-of-service attacks. The report then analyzes the concept of access control, discussing its role in limiting data access, authentication techniques, and the importance of strong passwords. Finally, it addresses the importance and limitations of using access control in an organization.