IT Governance, Risk, and Compliance

Sep 29 2012   12:00AM GMT

Online Data Communication Access Controls – Part II

Robert Davis Robert Davis Profile: Robert Davis

Control over access to communication devices may not be effective in an online infrastructure unless access to the employed communication configuration is also restricted. Yet, many online infrastructures have communication devices located at a considerable distance from the central computer technology enabling connections through data networking. Consequently, access controls over communication devices may only be effective in an online infrastructure where alternative communication protection techniques are deployed.

As a specific instance where deployment of alternative communication protection techniques is required, many communication configurations are vulnerable to unauthorized access via the ‘wiretapping’ of channels carrying datum to and from message presentation centers.  In order to combat this potential threat, controls that can be deployed to reduce the danger from ‘wiretapping’ include: fragmentation, intermixing, and encryption.

View Part I of the Online Data Communication Access Controls series here


Post Note: “Online Data Communication Access Controls – Part II” was originally published through under the title “Online Data Communication Access Controls”

Hot off the dotted line! MetricStream doing business as (dba) ComplianceOnline has commissioned me to contribute training material.

 Comment on this Post

There was an error processing your information. Please try again later.
Thanks. We'll let you know when a new response is added.
Send me notifications when other members comment.

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

Share this item with your network: