Entry points or functions are locked to prevent their use -
typically in response to an identified threat. Examples include the use of
physical locks used to prevent an intruder from escaping, lockout of computer
accounts based on incorrect authentication, and lockouts used to prevent
people from using systems or network components while under maintenance.
Complexity: The major complexity in lockouts comes when they are used
automatically. This leads to the possibility for enemy use reflexive
control to cause denial of services. Analyzing this class of behaviors is
quite complex.
fc@red.a.net