Red Hat NETSCAPE ENTERPRISE SERVER 6.0 - PROGRAMMER GUIDE TO SERVLETS Podręcznik Użytkownika Strona 8

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 328
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów
Przeglądanie stron 7
Security System Guide: Table of Contents
viii
Operations Confined to Specific Users...............................................................................1-16
Periodic Backup..................................................................................................................1-18
Use of the Security Function Provided by the Resource....................................................1-18
OLTP Function ..............................................................................................................................1-19
Resources to be Protected ......................................................................................................1-19
Functions to be Protected...................................................................................................1-19
Resources to be Protected.................................................................................................1-20
Possible Threats to Resources................................................................................................1-21
Countermeasures Against Security Risks ...............................................................................1-22
Countermeasures Against Decryption of Passwords.........................................................1-22
Countermeasures Against Exploitation of Passwords........................................................1-22
Countermeasures Against Tampering of Data Recorded in the File ..................................1-23
Countermeasures Against Exploitation of Information Recorded in Files..........................1-23
Countermeasures Against Damage to Data.......................................................................1-23
Countermeasures Against Damage to Files.......................................................................1-23
Smart Repository ..........................................................................................................................1-24
Resources Requiring Security Protection................................................................................1-24
Smart Repository Functions and Resources Requiring Protection....................................1-24
Potential Security Threats........................................................................................................1-25
Threats and Security Measures...............................................................................................1-25
Password Encryption..........................................................................................................1-26
Communication Data Encryption........................................................................................1-26
Periodic Change of Passwords ..........................................................................................1-26
Operation by Limited Users................................................................................................1-26
Periodic Data Backup.........................................................................................................1-27
Setting Access Rights for Files...........................................................................................1-27
Interstage Single Sign-on..............................................................................................................1-28
Configuration Model.................................................................................................................1-28
Possible Threats ......................................................................................................................1-29
Deleting, Rewriting, and Exposing Server Resources........................................................1-29
Rewriting and Exposure of Communication Contents........................................................1-29
User Spoofing .....................................................................................................................1-29
Authentication Server Spoofing ..........................................................................................1-29
DoS Attack ..........................................................................................................................1-29
Application Risk ..................................................................................................................1-30
Client Risk...........................................................................................................................1-30
Information Leakage Threat................................................................................................1-30
Security Measures...................................................................................................................1-30
Protecting the Authentication Infrastructure Setup File and Business System Setup File.1-30
Przeglądanie stron 7
1 2 3 4 5 6 7 8 9 10 11 12 13 ... 327 328

Komentarze do niniejszej Instrukcji

Brak uwag