22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

2.6 Summary<br />

94 Lotus Security Handbook<br />

To ensure that this cycle can repeat itself and can offer a better instance of the<br />

security infrastructure at each new cycle, a feedback mechanism is required.<br />

This feedback mechanism is important since it ensures that security is properly<br />

implemented throughout the organization, that it works as designed, that it works<br />

for the users and not the other way around, and finally and most importantly, it<br />

ensures that the security in the organization evolves as needed.<br />

In this chapter, we have looked at various methodologies for designing,<br />

deploying, and managing security in any organization.<br />

We <strong>cover</strong>ed are the following topics:<br />

► The notions of threats, risks, and risk mitigation<br />

► The human element and how it factors heavily in security<br />

► A number of methodologies: ISO 17799, the Common Criteria, and <strong>IBM</strong>’s<br />

Method for Architecting Secure Solutions (MASS)<br />

► The methodology used by <strong>IBM</strong>’s Software Services for Lotus.<br />

The rest of the contents of this redbook are built upon these methodologies.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!