Up One Level


Enforced Path

 

Normally, a user with the appropriate access control, is able to use any PC or workstation on the local area network to run an application or access certain data. However, where such data or system is classified as sensitive or requires restricted physical access, an enforced path may be applied. This is a straightforward configuration setting, performed by the Systems Administrator, whereby access is restricted to a specific workstation or range of workstations.

Enforcing the path will provide added security because it reduces the risk of unauthorised access; especially where such a workstation is itself within a secure zone, requiring physical access codes / keys etc.


*** The Information Security Glossary ***
Previous PageTop of this pageNext Page



Buy Now:

 

This Glossary forms part of the RUsecure Security Policy Suite... visit RUsecure Security Policy World
Use of the guidance contained within RUsecure™ is subject to the End User Licence Agreement
This site created with EasyHTMLHelp(tm) for MS Word
 Risk Associates: Resources for Security Risk Analysis, ISO 17799 / BS7799, Security Policies and Security Audit