22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Figure 2-11 The normal and imperiled IT business flow<br />

74 Lotus Security Handbook<br />

Security design objectives<br />

Traditionally, security requirements have been expressed by referencing the<br />

security services within the OSI model: authentication, access control, data<br />

confidentiality, data integrity, and non-repudiation. This practice introduces<br />

ambiguity when applied in the context of business processes. This ambiguity can<br />

contribute to a miscommunication of security requirements and a mismatch of<br />

functionality within the computing solution. As with other architecture disciplines,<br />

the technical objectives of the security design activity need to be articulated in<br />

quantifiable terms. Specific design objectives need to be developed and<br />

validated for each solution. For reference in this project, the following set of<br />

security design objectives were derived as a result of an analysis of the<br />

security-incident handling and reporting system for one corporation:

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!