03.05.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

2.3 <strong>Security</strong> in use<br />

Since security is a complex and diversified topic, it is important to keep it simple.<br />

The following list will show the basic security areas. These areas have to be<br />

taken into account and their requirements must always be fulfilled.<br />

►<br />

►<br />

►<br />

►<br />

►<br />

►<br />

►<br />

►<br />

Authentication / Identification - Measures designed to protect against<br />

fraudulent transmission and imitative communications by establishing the<br />

validity of transmission, message, station or individual.<br />

Access Control - The prevention of improper use of a resource, including the<br />

use of a resource in an unauthorized manner.<br />

Privacy / Confidentiality - Assurance that information is not made available<br />

or disclosed to unauthorized individuals, entities, or processes.<br />

Integrity - The correctness of information, of the origin of the information, and<br />

of the functioning of the system that processes it.<br />

Accountability / Non-repudiation - Assurance that the actions of an entity<br />

may be traced uniquely to the entity. This ensures that there is information to<br />

prove ownership of the transaction.<br />

Administration / Configuration - Methods by which security policies are<br />

incorporated into the architecture and the functionality that the system<br />

architecture needs to support.<br />

Assurance / Monitoring - Confidence that an entity meets its security<br />

objectives; this is usually provided through an Intrusion Detection System.<br />

<strong>Security</strong> Management - Assurance that an entity meets its security<br />

management objectives, processes and procedures.<br />

If you keep this list in mind during design and development, security will be well<br />

implemented.<br />

18 <strong>IBM</strong> <strong>WebSphere</strong> <strong>V5.0</strong> <strong>Security</strong> Handbook

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!