IT Governance, Risk, and Compliance

Sep 29 2012   12:00AM GMT

Online Data Communication Access Controls – Part II



Posted by: Robert Davis
Tags:
BYOD
Configuration Management
Distributed Platforms
ICT
Information Assets Protection
Information Security
IT Architecture
IT Configuration
IT Infrastructure
Physical Security
QoS
Risk Management
Service Delivery

Control over access to communication devices may not be effective in an online infrastructure unless access to the employed communication configuration is also restricted. Yet, many online infrastructures have communication devices located at a considerable distance from the central computer technology enabling connections through data networking. Consequently, access controls over communication devices may only be effective in an online infrastructure where alternative communication protection techniques are deployed.

As a specific instance where deployment of alternative communication protection techniques is required, many communication configurations are vulnerable to unauthorized access via the ‘wiretapping’ of channels carrying datum to and from message presentation centers.  In order to combat this potential threat, controls that can be deployed to reduce the danger from ‘wiretapping’ include: fragmentation, intermixing, and encryption.

View Part I of the Online Data Communication Access Controls series here

 

Post Note: “Online Data Communication Access Controls – Part II” was originally published through Suite101.com under the title “Online Data Communication Access Controls”

Hot off the dotted line! MetricStream doing business as (dba) ComplianceOnline has commissioned me to contribute training material.

 Comment on this Post

 
There was an error processing your information. Please try again later.
Thanks. We'll let you know when a new response is added.
Send me notifications when other members comment.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: