22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

1.3.2 Confidentiality<br />

Confidentiality can be summed up as the following:<br />

► Assurance that information is not disclosed to unauthorized persons,<br />

processes, or devices. [INFOSEC-99]<br />

► In regard to classified or sensitive information, the degree to which the<br />

information has not been compromised, in that it has not been made available<br />

or disclosed to unauthorized individuals, processes, or other entities<br />

Specific to the <strong>IBM</strong> architecture, confidentiality can be said to protect sensitive<br />

information from disclosure.<br />

When it is stored locally, sensitive data can be protected by access controls or<br />

encryption mechanisms. For network communication security, sensitive data<br />

should be encrypted as it is transmitted from system to system.<br />

There are specific ISO standards (8730, 8731, and 9564) relating to use of<br />

cryptography for confidentiality and data integrity.<br />

1.3.3 Identification and authentication<br />

Identification and authentication (I&A) facilities verify the identity of individuals.<br />

The basic function uniquely identifies users and programs, verifies these<br />

identities, and assures individual accountability. In other words, identification and<br />

authentication is required to ensure that users are associated with the proper<br />

security attributes (for example, identity, groups, roles, security or integrity<br />

levels).<br />

The unambiguous identification of authorized users and the correct association<br />

of security attributes with users and subjects is critical to the enforcement of the<br />

intended security policies. The security services and facilities in this class deal<br />

with determining and verifying the identity of users, determining their authority to<br />

interact with key components of the IT Infrastructure, key components of the<br />

computer system, or key information handled by software running on the<br />

computer system (for instance, a document in a Notes database), based on the<br />

correct association of security attributes for each authorized user.<br />

These are all dependent upon correct identification and authentication of users in<br />

order to be effective.<br />

Authentication may take many forms, such as:<br />

► Simple authentication, for an individual user of the computer system, which is<br />

generally based on a user ID and a password. This is generally the weakest<br />

form of authentication.<br />

Chapter 1. Fundamentals of IT security 19

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!