Most network security systems operate by allowing selective use of services. An access control list is the usual means by which the system controls access to, and denial of, its services. It matches a list of available services, with the names of the hosts permitted to use those services.