03.05.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

2.1 <strong>Security</strong><br />

As new business practices emerge, most enterprises are finding that their<br />

existing security infrastructure is not capable of meeting the rapidly changing and<br />

more rigorous demands of business over the Internet. The demands of network<br />

security have now gone far beyond simply managing user accounts and<br />

restricting access between internal and external networks. These demands now<br />

require a sophisticated system that allows fine-grained access control to<br />

resources, yet is manageable enough to be tailored to protect systems from<br />

many types of security threats.<br />

<strong>Security</strong> is a fairly vast topic; everything involves security to some extent, in a<br />

certain format. There are two main areas which have to be discussed separately:<br />

► Physical security<br />

► Logical security<br />

Systems have to be protected both from outsiders and insiders. Do not forget<br />

that not every intrusion or attack is intentional; misuse of a system or improper<br />

administration can also cause damage.<br />

2.1.1 Physical security<br />

Physical security means protection against physical actions. It involves every<br />

physical element around:<br />

► The machine(s) where the application is running.<br />

► The room where the machines are operating.<br />

► The building where the machines are installed.<br />

► The site where the company is located.<br />

The listed elements have to be secured against intrusion and damage, whether it<br />

be intentional or not.<br />

Physical security also includes the protection of communication channels:<br />

► Ground lines<br />

► Wireless connection<br />

The communication network has to be protected against eavesdropping and<br />

damage to the connection (cutting the line).<br />

The subject of physical security goes much further than the objective of this book<br />

allows. This short section is only intended as a reminder of the concept of logical<br />

security.<br />

6 <strong>IBM</strong> <strong>WebSphere</strong> <strong>V5.0</strong> <strong>Security</strong> Handbook

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!