The knack of NAC - notebook: network access control
Author :
Bowen, R.
Volume :
2
Issue :
5
fYear :
2005
Firstpage :
32
Lastpage :
33
Abstract :
IMAGINE THE FOLLOWING SCENARIO: an employee takes advantage of an unoccupied executive office to insert a USB key into the laptop on the desk. Within seconds he copies confidential information on to his key and then walks away.