22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

With this said, the overall security in our model is split into two basic categories:<br />

physical security and logical security. They are discussed in detail in the<br />

following sections.<br />

10.2 Physical security<br />

Physical security is basically concerned with restricting physical access to the<br />

server and the information it contains and is only one aspect of the security that<br />

should be afforded to the server in our model, as best shown in Figure 10-3.<br />

Figure 10-3 Physical security<br />

It is imperative that the Domino server be physically secured. Physically securing<br />

a server helps prevents physical tampering with both the server and the data it<br />

contains.<br />

Physical tampering includes unwanted access by unauthorized parties, as well<br />

as any form of sabotage which would prevent the server from functioning in the<br />

manner it should.<br />

Data tampering includes access by unauthorized parties to make unauthorized<br />

and untraceable database movements as well as possible modifications and<br />

deletions to the data the databases contain.<br />

The following basic points should be applied to provide physical security:<br />

► The server should be located in a secure area, where access is controlled<br />

and monitored.<br />

► Only authorized personnel should be permitted access to the cabinets holding<br />

the servers. In the case of self-standing servers, only authorized personnel<br />

should be permitted to physically manipulate these machines.<br />

Chapter 10. The Notes/Domino security model 417

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!