Controlled area
Encyclopedia
In telecommunication
Telecommunication
Telecommunication is the transmission of information over significant distances to communicate. In earlier times, telecommunications involved the use of visual signals, such as beacons, smoke signals, semaphore telegraphs, signal flags, and optical heliographs, or audio messages via coded...

, the term controlled area is an area in which uncontrolled movement will not result in compromise
Compromise
To compromise is to make a deal where one person gives up part of his or her demand.In arguments, compromise is a concept of finding agreement through communication, through a mutual acceptance of terms—often involving variations from an original goal or desire.Extremism is often considered as...

 of classified information
Classified information
Classified information is sensitive information to which access is restricted by law or regulation to particular groups of persons. A formal security clearance is required to handle classified documents or access classified data. The clearance process requires a satisfactory background investigation...

, that is designed to provide administrative control and safety, or that serves as a buffer
Buffer zone
A buffer zone is generally a zonal area that lies between two or more other areas , but depending on the type of buffer zone, the reason for it may be to segregate regions or to conjoin them....

 for controlling access
Access control
Access control refers to exerting control over who can interact with a resource. Often but not always, this involves an authority, who does the controlling. The resource can be a given building, group of buildings, or computer-based information system...

 to limited-access areas. It can also refer to an area to which security
Security
Security is the degree of protection against danger, damage, loss, and crime. Security as a form of protection are structures and processes that provide or improve security as a condition. The Institute for Security and Open Methodologies in the OSSTMM 3 defines security as "a form of protection...

 controls have been applied to protect an information-processing system
System
System is a set of interacting or interdependent components forming an integrated whole....

's equipment and wirelines, equivalent to that required for the information transmitted through the system.
The source of this article is wikipedia, the free encyclopedia.  The text of this article is licensed under the GFDL.
 
x
OK