Managing Network Access Controls

Connections to the network (including users' logon) have to be properly managed to ensure that only authorised devices / persons are connected.

To view the related Policy click      

 

  • Unauthorised access to programs or applications could lead to fraudulent transactions or false entries.

There are multiple Key Actions providing safeguards against this Information Security Issue. These are available in the registered version of RUSecure™.

 

  • Where physical or logical access has not been controlled, users may find (and exploit) unintentional access routes to systems and network resources. For example: they connect a laptop to a disused wall socket, bypass the login server, and connect directly to the main server.

There are multiple Key Actions providing safeguards against this Information Security Issue. These are available in the registered version of RUSecure™.

 

  • Unauthorised external access to your network will usually result in damage, corruption and almost certain loss of confidentiality of corporate information. Such hacks are usually motivated by malicious or fraudulent indent.

There are multiple Key Actions providing safeguards against this Information Security Issue. These are available in the registered version of RUSecure™.

 

  • Incomplete or incorrect data in a user's network access profile could result in their being permitted to modify, delete, or have access to, confidential information on inappropriate network resources, for example :-
  1. Personal Computers
  2. Disk storage systems
  3. Application servers
  4. Web servers
  5. Dial up or leased communications lines
  6. Networked fax systems.

 

There are multiple Key Actions providing safeguards against this Information Security Issue. These are available in the registered version of RUSecure™.

 

  • Modifications made to a network access profile without adequate change control procedures in place could result in unexpected (and probably accidental) access to unauthorised network resources. (See above.)

There is 1 Key Action providing safeguards against this Information Security Issue. These are available in the registered version of RUSecure™.

 

  • User IDs which suggest their privileges (e.g. a User ID of 'allprivs') may invite hackers to try hard to crack their password.

There are multiple Key Actions providing safeguards against this Information Security Issue. These are available in the registered version of RUSecure™.

 

  • Connections to a third party network (say, in Business to Business e-Commerce situations), can not only possibly introduce viruses, but can also disrupt business operations where data is inadvertently transmitted into your network.

There are multiple Key Actions providing safeguards against this Information Security Issue. These are available in the registered version of RUSecure™.

 

Previous PageTop of this pageNext Page


Information Security Policies from US$595

 From
 US$595

Use of the guidance contained within RUSecure™ is subject to the End User Licence Agreement
This site created with EasyHTMLHelp(tm) for MS Word

 

Next PageUpPrevious Page