22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

10.1 Components of the Notes/Domino security model<br />

416 Lotus Security Handbook<br />

At its most basic, there are three components of the Notes security model: server<br />

(physical) access, database access, and data access. The server contains the<br />

database, which contains the data, as best shown in Figure 10-1.<br />

Figure 10-1 The three components of the Notes security model<br />

From this we can identify three types of overall security concerns which we must<br />

consider: physical security, network security and Notes security. This is<br />

illustrates in Figure 10-2.<br />

Figure 10-2 The three types of security concerns<br />

Here we can see that server security needs to be dealt with from a physical,<br />

network and Notes security perspective, whereas database and data protection<br />

(for the purposes of this security concept), need to be dealt with only from a<br />

Notes security perspective. In order to be as clear as possible, we look at each<br />

type of security and make recommendations and suggestions for organizations<br />

wanting to implement it.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!