Posted by: Robert Davis
BYOD, Configuration Management, Distributed Platforms, ICT, Information Assets Protection, Information Security, IT Architecture, IT Configuration, IT Infrastructure, Physical Security, QoS, Risk Management, Service Delivery
Control over access to communication devices may not be effective in an online infrastructure unless access to the employed communication configuration is also restricted. Yet, many online infrastructures have communication devices located at a considerable distance from the central computer technology enabling connections through data networking. Consequently, access controls over communication devices may only be effective in an online infrastructure where alternative communication protection techniques are deployed.
As a specific instance where deployment of alternative communication protection techniques is required, many communication configurations are vulnerable to unauthorized access via the ‘wiretapping’ of channels carrying datum to and from message presentation centers. In order to combat this potential threat, controls that can be deployed to reduce the danger from ‘wiretapping’ include: fragmentation, intermixing, and encryption.
“View Part I of the Online Data Communication Access Controls series here”
Post Note: “Online Data Communication Access Controls – Part II” was originally published through Suite101.com under the title “Online Data Communication Access Controls”
Hot off the dotted line! MetricStream doing business as (dba) ComplianceOnline has commissioned me to contribute training material.